Course Outline
Introduction
- Overview of cybersecurity landscape
- Importance of cybersecurity in the digital age
- Role of analysts in cybersecurity
Fundamentals of Cybersecurity
- Understanding cyber threats: Malware, Phishing, Ransomware, etc.
- Basic cybersecurity principles: CIA Triad (Confidentiality, Integrity, Availability)
- Common attack vectors
Cybersecurity Frameworks and Standards
- Overview of NIST Cybersecurity Framework
- ISO/IEC 27001, GDPR, and other relevant standards
- Best practices in cybersecurity
Network Security Basics
- Understanding network architecture
- Key concepts: Firewalls, VPNs, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS)
- Network security protocols
Threats to Network Security
- Network-based attacks: DDoS, Man-in-the-Middle (MitM), etc.
- Exploiting network vulnerabilities
Securing the Network
- Implementing firewalls and VPNs
- Network segmentation and zero-trust architecture
- Best practices for network security
Understanding Data Security
- Types of data: Structured vs. Unstructured
- Data classification and governance
- Data protection strategies
Introduction to Encryption
- Basics of encryption: Symmetric vs. Asymmetric
- SSL/TLS and Public Key Infrastructure (PKI)
- Data encryption best practices
Protecting Sensitive Data
- Data Loss Prevention (DLP) strategies
- Encryption of data at rest and in transit
- Implementing access control measures
Introduction to Incident Response
- The incident response lifecycle
- Building an incident response team
- Incident response plans and playbooks
Threat Intelligence and Analysis
- Gathering and analyzing threat intelligence
- Tools and techniques for threat analysis
- Using SIEM (Security Information and Event Management) systems
Incident Detection and Response
- Identifying and responding to security incidents
- Forensic analysis and evidence collection
- Reporting and documenting incidents
Understanding Emerging Cyber Threats
- Latest trends in cyber threats (e.g., AI-driven attacks, IoT vulnerabilities)
- Understanding Advanced Persistent Threats (APTs)
- Preparing for future cybersecurity challenges
Ethical Hacking and Penetration Testing
- Basics of ethical hacking
- Penetration testing methodologies
- Conducting vulnerability assessments
Summary and Next Steps
Requirements
- Basic understanding of IT concepts and networking
- Familiarity with operating systems and basic command-line tools
Audience
- Analysts
- IT professionals
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from €6840 online delivery, based on a group of 2 delegates, €2160 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions