Course Outline
Introduction
- Overview of cybersecurity landscape
- Importance of cybersecurity in the digital age
- Role of analysts in cybersecurity
Fundamentals of Cybersecurity
- Understanding cyber threats: Malware, Phishing, Ransomware, etc.
- Basic cybersecurity principles: CIA Triad (Confidentiality, Integrity, Availability)
- Common attack vectors
Cybersecurity Frameworks and Standards
- Overview of NIST Cybersecurity Framework
- ISO/IEC 27001, GDPR, and other relevant standards
- Best practices in cybersecurity
Network Security Basics
- Understanding network architecture
- Key concepts: Firewalls, VPNs, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS)
- Network security protocols
Threats to Network Security
- Network-based attacks: DDoS, Man-in-the-Middle (MitM), etc.
- Exploiting network vulnerabilities
Securing the Network
- Implementing firewalls and VPNs
- Network segmentation and zero-trust architecture
- Best practices for network security
Understanding Data Security
- Types of data: Structured vs. Unstructured
- Data classification and governance
- Data protection strategies
Introduction to Encryption
- Basics of encryption: Symmetric vs. Asymmetric
- SSL/TLS and Public Key Infrastructure (PKI)
- Data encryption best practices
Protecting Sensitive Data
- Data Loss Prevention (DLP) strategies
- Encryption of data at rest and in transit
- Implementing access control measures
Introduction to Incident Response
- The incident response lifecycle
- Building an incident response team
- Incident response plans and playbooks
Threat Intelligence and Analysis
- Gathering and analyzing threat intelligence
- Tools and techniques for threat analysis
- Using SIEM (Security Information and Event Management) systems
Incident Detection and Response
- Identifying and responding to security incidents
- Forensic analysis and evidence collection
- Reporting and documenting incidents
Understanding Emerging Cyber Threats
- Latest trends in cyber threats (e.g., AI-driven attacks, IoT vulnerabilities)
- Understanding Advanced Persistent Threats (APTs)
- Preparing for future cybersecurity challenges
Ethical Hacking and Penetration Testing
- Basics of ethical hacking
- Penetration testing methodologies
- Conducting vulnerability assessments
Summary and Next Steps
Requirements
- Basic understanding of IT concepts and networking
- Familiarity with operating systems and basic command-line tools
Audience
- Analysts
- IT professionals
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from €6840 online delivery, based on a group of 2 delegates, €2160 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
It opens up a lot and gives lots of insight what security
Nolbabalo Tshotsho - Vodacom SA
Course - Advanced Java Security
I was benefit from the exercises (SQL injection, XSS, CRSF. .).