Module 1: Introduction to Cybersecurity
Learning Objectives
- Identify and explain cybersecurity concepts.
- Identify main components of telecommunications technologies.
- Differentiate types of security.
Topics
- Overview
- What is Security?
- Types of Security
Module 2: Cybersecurity and Privacy
Learning Objectives
- Identify differences between information technology systems and specialized systems.
- Discuss enterprise cybersecurity roles and responsibilities.
- Define governance, risk management and compliance (GRC).
- Distinguish between privacy and security.
Topics
- Specialized Systems
- Roles and Responsibilities
- Governance, Risk Management and Compliance
- Cybersecurity Governance
- Privacy
- Privacy vs. Security
Module 3: Service Disruption and Cybersecurity
Learning Objectives
- Identify and discuss common causes of enterprise service disruption.
- Explain business continuity planning.
- Describe the relationship between business continuity planning (BCP) and disaster recovery (DR).
Topics
- Resilience
- Business Continuity and Disaster Recovery
- Business Impact Analysis
- Recovery Concepts
Module 4: Threat Landscape
Learning Objectives
- Identify and discuss common causes of enterprise service disruption.
- Explain business continuity planning.
- Describe the relationship between business continuity planning (BCP) and disaster recovery (DR).
Topics
- Specialized Systems
- Roles and Responsibilities
- Governance, Risk Management and Compliance
- Cybersecurity Governance
- Privacy
- Privacy vs. Security
Module 5: Cyberattacks
Learning Objectives
- Identify and explain cybersecurity concepts.
- Identify main components of telecommunications technologies.
- Differentiate types of security.
Topics
- Attack Attributes
- Attack Process
- Malware and Attacks
Module 6: Risk Mitigation
Learning Objectives
- Identify differences between information technology systems and specialized systems.
- Discuss enterprise cybersecurity roles and responsibilities.
- Define governance, risk management and compliance (GRC).
- Distinguish between privacy and security
Topics
- Risk Assessment
- Supply Chain Considerations
- Risk Management Life Cycle
- Managing Risk
- Using the Results of Risk Assessments
Module 7: Securing Assets
Learning Objectives
- Identify differences between information technology systems and specialized systems.
- Discuss enterprise cybersecurity roles and responsibilities.
- Define governance, risk management and compliance (GRC).
- Distinguish between privacy and security.
Topics
- Risk Identification, Standards, Frameworks and Industry Guidance
- Endpoint Security
- System Hardening
- Logging, Monitoring and Detection
- Data Security
Module 8: Security Architecture
Learning Objectives
- Identify components of a security architecture.
- Compare security models.
Topics
- Architecture, Models, and Frameworks
Module 9: Security Controls
Learning Objectives
- Explain defense in depth.
- Compare traditional security and assume-breach philosophies.
- Identify three main types of security controls.
- Distinguish types of logical access controls.
- Identify and explain types of administrative controls.
- Explain each component of authentication, authorization and accounting (AAA).
Topics
Module 10: Network Security
Learning Objectives
- Explain methods to achieve isolation and segmentation.
- Identify network security hardware.
- Distinguish types of firewalls.
Topics
Module 11: Application and Cloud Security
Learning Objectives
- Recognize system life cycle management principles, including software security and usability.
- Identify and analyze cloud service models.
- Discuss risk associated with cloud computing.
Topics
- Application Security
- Cloud Security
Module 12: Software Management and Encryption
Learning Objectives
- Identify elements of cryptographic systems.
- Identify and discuss key systems.
Topics
- Configuration Management
- Change Management
- Patch Management
- Encryption Fundamentals, Techniques and Applications
Module 13: Introducing Security Operations
Learning Objectives
- Discuss security operations center (SOC) deployment models.
- Identify common SOC functions, roles and responsibilities.
- Identify vulnerability assessment tools, including open source tools and their capabilities.
Topics
Module 14: Testing Technologies and Security Tools
Learning Objectives
- Differentiate vulnerability scanning and penetration testing.
- Discuss common phases of penetration testing.
- Identify and use common cybersecurity tools.
- Discuss components that aid cybersecurity monitoring and detection.
Topics
- Tool and Technologies (Monitoring, Detection, Correlation)
- Forensics
Module 15: Handling Security Incidents
Learning Objectives
- Understand incident response and handling methodologies.
- Distinguish between an event and an incident.
- Discuss the elements of an incident response plan (IRP).
Topics
- Incident Handling
- Practice Labs
- SQL Injection
- Windows Event Monitoring & Defender
- Threat Removal
- Threat Detection
- File Permissions on Windows and Linux
- Forensics: File Recovery, Baselining with Lynis
- Scanning Ports and Utilizing SSH
- Windows and Linux OS Firewalls