Cyber Security
In today’s world, organizations must be prepared to defend against threats in cyberspace. Decision makers must be familiar with the basic principles and best practices of cybersecurity to best protect their enterprises.
Prerequisites: CompTIA A+, CompTIA Network+, and CompTIA Security+
Duration: 6 - 8 Weeks
Dates
- No scheduled dates for this course
Lecturers
Description
In today’s world, organizations must be prepared to defend against threats in cyberspace. Decision makers must be familiar with the basic principles and best practices of cybersecurity to best protect their enterprises. In this course, experts from academia, the military, and industry share their knowledge to give participants the principles, the state of the practice, and strategies for the future.
Sessions will address information security, ethical and legal practices, and mitigating cyber vulnerabilities. Participants will also learn about the process of incident response and analysis. The content is targeted at ensuring the privacy, reliability, and integrity of information systems.
The majority of the course (about 75%) is geared toward participants at the decision-making level who need a broad overview, rather than those who are already deeply immersed in the technical aspects of cybersecurity (software development, digital forensics, etc.), although both groups will find the course valuable.
Cybersecurity is a very large subject, and therefore this course is only intended to cover the basics of the current leading and pressing cybersecurity topics. The result is that we can cover many different approaches. We cover the introduction of a topic and after the fundamentals, you can explore further on your own. The goal is for participants to understand the utility of each topic, not to become specialists in any one subject.
Learning Objectives
The participants of this course will be able to:
1. Secure both clean and corrupted systems, protecting personal data, securing simple computer networks, and safe Internet usage.
2. Understand key terms and concepts in cyber law, intellectual property and cyber crimes, trademarks and domain theft.
3. Determine computer technologies, digital evidence collection, and evidentiary reporting in forensic acquisition.
4. Incorporate approaches to secure networks, firewalls, intrusion detection systems, and intrusion prevention systems.
5. Examine secure software construction practices.
6. Understand principles of web security.
7. Incorporate approaches for incident analysis and response.
8. Incorporate approaches for risk management and best practices.
Who Should Attend
Seventy-five percent of the course is geared toward providing a basic framework for professionals making cybersecurity decisions in industry and government and individuals seeking to immerse themselves in the pressing issues of cybersecurity, giving them the information they need to make the best decisions for the defense of their organizations. About a quarter of the course covers more technical areas of interest to people with more engineering-focused backgrounds, such as software developers or those working in digital forensics. Although those with a computing background would be better prepared for the more technical topics, an engineering or computing background is not required to benefit from any of the sessions.
Program Outline
Please note that the exact nature and order of the topics is subject to change.
Introduction to Information Security Fundamentals and Best Practices
Protecting Your Computer and its Contents
Securing Computer Networks - Basics of Networking
Compromised Computers
Secure Communications and Information Security Best Practices
Privacy Guidelines
Safe Internet Usage
Ethics in Cybersecurity & Cyber Law
Privacy
Intellectual Property
Professional Ethics
Freedom of Speech
Fair User and Ethical Hacking
Trademarks
Internet Fraud
Electronic Evidence
Cybercrimes
Forensics
Forensic Technologies
Digital Evidence Collection
Evidentiary Reporting
Network Assurance
Layered Defense
Surveillance and Reconnaissance
Outsider Thread Protection
Secure Software & Browser Security
Software Construction
Software Design and Architecture
Software Testing
Methodologies
The New Universal Client
The Web Model
Cookies and Browser Storage
HTML5 Security
Business Information Continuity
Managing a Business Information Continuity Plan
Vulnerabilities and Controls
The Law and Business Information Continuity Plan
Information Risk Management
Asset Evaluation and Business Impact Analysis
Risk Identification
Risk Quantification
Risk Response Development and Control
Security Policy, Compliance, and Business Continuity
Cyber Incident Analysis and Response
Incident Preparation
Incident Detection and Analysis
Containment, Eradication, and Recovery
Proactive and Post Incident Cyber Services