Cybersecurity Fundamentals Course Malaysia


 

Course Description

The Cybersecurity Fundamentals Course provides learners with principles of data and technology that define cybersecurity. Learners gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The interactive, self-guided format provides a dynamic learning experience where users can explore foundational cybersecurity principles, security architecture, risk management, attacks, incidents and emerging IT and IS technologies.

Learning Objectives:

At the completion of this course you will be able to:

  • Explain the core information assurance (IA) principles
  • Identify the key components of cybersecurity network architecture
  • Apply cybersecurity architecture principles
  • Describe risk management processes and practices
  • Identify security tools and hardening techniques
  • Distinguish system and application security threats and vulnerabilities
  • Describe different classes of attacks
  • Define types of incidents including categories, responses and timelines for response
  • Describe new and emerging technologies
  • Analyze threats and risks within context of the cybersecurity architecture

 

Introduction to Cybersecurity

  • Cybersecurity objectives
  • Cybersecurity roles
  • Differences between Information Security and Cybersecurity

Cybersecurity Principles

  • Confidentiality, integrity and availability
  • Authentication and nonrepudiation

Information Security (IS) within Lifecycle Management

  • Lifecycle management landscape
  • Security architecture processes
  • Security architecture tools
  • Intermediate lifecycle management concepts

Risks and Vulnerabilities

  • Basics of risk management
  • Operational threat environments
  • Classes of attacks

Incident Response

  • Incident categories
  • Incident response
  • Incident recovery

Future Implications and Evolving Technologies

  • New and emerging IT and IS technologies
  • Mobile security issues, risks and vulnerabilities
  • Cloud concepts around data and collaboration

 

For Training Requirement Contact-

udithait@gmail.com

training@bluechiptraining.biz

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *