Cybersecurity Fundamentals Course Petaling Jaya

Course Description

The Cybersecurity Fundamentals Course provides learners with principles of data and technology that define cybersecurity. Learners gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The interactive, self-guided format provides a dynamic learning experience where users can explore foundational cybersecurity principles, security architecture, risk management, attacks, incidents and emerging IT and IS technologies.

Learning Objectives:

At the completion of this course you will be able to:

  • Explain the core information assurance (IA) principles
  • Identify the key components of cybersecurity network architecture
  • Apply cybersecurity architecture principles
  • Describe risk management processes and practices
  • Identify security tools and hardening techniques
  • Distinguish system and application security threats and vulnerabilities
  • Describe different classes of attacks
  • Define types of incidents including categories, responses, and timelines for response
  • Describe new and emerging technologies
  • Analyze threats and risks within the context of the cybersecurity architecture

Introduction to Cybersecurity

  • Cybersecurity objectives
  • Cybersecurity roles
  • Differences between Information Security and Cybersecurity

Cybersecurity Principles

  • Confidentiality, integrity, and availability
  • Authentication and nonrepudiation

Information Security (IS) within Lifecycle Management

  • Lifecycle management landscape
  • Security architecture processes
  • Security architecture tools
  • Intermediate lifecycle management concepts

Risks and Vulnerabilities

  • Basics of risk management
  • Operational threat environments
  • Classes of attacks

Incident Response

  • Incident categories
  • Incident response
  • Incident recovery

Future Implications and Evolving Technologies

  • New and emerging IT and IS technologies
  • Mobile security issues, risks, and vulnerabilities
  • Cloud concepts around data and collaboration

For Training Requirement Contact-

udithait@gmail.com

training@bluechiptraining.biz

Leave a Reply

Your email address will not be published. Required fields are marked *