This course teaches the basics regarding Information Security, including a holistic view of modern network security, operating system hardening, firewalls, Encryption, Application Security, Incident Response and Recovery.
This course teaches the basics regarding Information Security, including a holistic view of modern network security, operating system hardening, firewalls, Encryption, Application Security, Incident Response and Recovery.
This course is aimed to those considering a career in cyber security.
There are no special prerequisites for you to meet to successfully start this course.
Module 1: Information Security
Lessons:
What is Security
Confidentiality, Integrity and Availability triad
Privacy
Non-Repudiation
Types of Attacks
Threats, Vulnerabilities and Risk
Risk Management
Review Questions
Module 2: Identification, Authentication and Authorisation
Lessons:
Identification
Authentication
Password and Multifactor Authentication
Biometrics
Authorization
Review Questions
Module 3: Access Control
Lessons:
Access Control Lists (ACLs)
Access Control Models and Methodologies
Discretionary Access Control
Mandatory Access Control
Role-based Access Control
Review Questions
Module 4: Law and Compliance
Lessons:
Laws and Regulations
Compliance (Regulatory & Industry Compliance)
Review Questions
Module 5: Fundamentals of Encryption
Lessons:
The History of Encryption
Modern Encryption Methods
Windows and Linux Encryption
Hashing
Review Questions
Module 6: Network Infrastructure and Security
Lessons:
IP Protocols
Management Protocols
Routers and Switches
Firewalls
Firewall Implementation
Proxy Servers
Windows Firewalls
Linux Firewalls
Wireless Security
Mobile Device Security
Network Security Tools
Review Questions
Module 7: Microsoft Windows Infrastructure
Lessons:
Active Directory Domain Services
Group Policy Objects
Configuring Windows
Windows Update
Review Questions
Module 8: UNIX / Linux Server
Lessons:
Configuring Linux
Third Party Software Updates
Core Operating System updates
Review Questions
Module 9: Assessing System Security
Lessons:
Risk Assessment
Conducting an Initial Assessment
Probing the Network
Vulnerabilities
Documenting Security
Review Questions
Module 10: Application Security
Lessons:
Software Development Vulnerabilities
Buffer Overflows
Input Validation Attacks
Authentication, Authorisation and Cryptographic Attacks
Web Security
Database Security
Application Security tools
Review Questions
Module 11: Incident Response and Recovery
Lessons:
What is Incident Response
The Incident Response Process Model
Why Incident Response is needed
Disaster Recovery
Business Continuity
Fault Tolerance
Review Questions
If you’re interested in attending a private training session or would like to receive our schedule, please don’t hesitate to contact us!