+ All Categories
Home > Documents > › download › clientfiles › file… · Web viewThis module will cover how to apply secure...

› download › clientfiles › file… · Web viewThis module will cover how to apply secure...

Date post: 26-Jun-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
3
DIGITAL SKILLS ACADEMY: Course Details Title: Cyber Security Intelligence No. of places: 15 Duration: Four Days (9:30am to 4:00pm) Dates: Day one - 26 September 2019 Day two - 3 October 2019 Day three - 10 October 2019 Day four - 17 October 2019 Venue Location Top Valley Academy, Top Valley Drive, Nottingham NG5 9AZ September/October Course Overview Cyber security is fast becoming one of the most important roles in the tech sector as cyber criminals and hackers become ever more sophisticated. This four-day training course will provide a significant exposure to what it takes to develop an exciting and satisfying career with Cyber Intelligence. Outline Day 1: Module 1 - Understanding the threats This module concentrates on understanding the threats we face by defining what hackers are, their motivations, and the tools they use. This section takes a look at the processes involved in a hacking attack. Delegates will learn about foot printing, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks. Module 2 - The basics of Information Security This module is dedicated to understanding the basics of Information Security and looks at how an organisation might approach the task of securing their networks against attacks. In this section, delegates will learn about the CIA triad, the creation of an ISMS, risk management, the implementation of security controls, penetration testing and incident management. Day 2 Module 3 - Access Controls This module will look at the types of access control, physical access, controlling
Transcript
Page 1: › download › clientfiles › file… · Web viewThis module will cover how to apply secure design principles to network architecture; secure network components, the design and

DIGITAL SKILLS ACADEMY:

Course Details

Title: Cyber Security Intelligence No. of places: 15

Duration: Four Days (9:30am to 4:00pm)

Dates: Day one - 26September 2019

Day two - 3 October 2019

Day three - 10 October 2019

Day four - 17 October 2019

Venue Location

Top Valley Academy, Top Valley Drive, Nottingham NG5 9AZ

September/October Course Overview

Cyber security is fast becoming one of the most important roles in the tech sector as cyber criminals and hackers become ever more sophisticated.

This four-day training course will provide a significant exposure to what it takes to develop an exciting and satisfying career with Cyber Intelligence.

OutlineDay 1:Module 1 - Understanding the threatsThis module concentrates on understanding the threats we face by defining what hackers are, their motivations, and the tools they use. This section takes a look at the processes involved in a hacking attack. Delegates will learn about foot printing, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks.

Module 2 - The basics of Information SecurityThis module is dedicated to understanding the basics of Information Security and looks at how an organisation might approach the task of securing their networks against attacks. In this section, delegates will learn about the CIA triad, the creation of an ISMS, risk management, the implementation of security controls, penetration testing and incident management.

Day 2Module 3 - Access ControlsThis module will look at the types of access control, physical access, controlling resource access, Microsoft Windows NTFS, Linus ext3/4, and cloud security.

Module 4 - Security Operations and AdministrationThis module covers a variety of topics including understanding how to support investigations, and requirements for investigation types; how to conduct logging and monitoring of activities; what to do to secure the provision of resources. It then goes on to explore how to apply foundational security operations concepts, employ resource protection techniques, conduct incident management and operate and maintain preventative measures.

Day 3Module 5 - Risk Identification, Monitoring and Analysis

Page 2: › download › clientfiles › file… · Web viewThis module will cover how to apply secure design principles to network architecture; secure network components, the design and

DIGITAL SKILLS ACADEMY:

This module is focused on the importance of risk management, and explores how to assess risk, mitigate risk and integrate documents into risk management.

Module 6 - Incident Response and RecoveryThis module covers how to deploy incident handling and response architecture, contain and mitigate incidents, and prepare for a forensic investigation as a CSIRT.

Day 4Module 7 – CryptographyThis module highlights the current practices of core primitives, and emerging algorithms, techniques for analysis of these the protocols which use them.

Module 8 - Network and Communications SecurityThis module will cover how to apply secure design principles to network architecture; secure network components, the design and establishing of secure communication channels and how to prevent or mitigate network attacks.

Module 9 - Systems and Application SecurityThe final module of this four-day course covers the general guidelines for application security, securing web and mail applications, and databases.

Key training course outcomesThis introductory course will give you an essential cyber-security skills that will make you more employable in roles across the IT industry and will be particularly useful to those thinking about focusing on cyber security.

Desired Skills required?

The successful applicant will have a thorough understanding of computer systems and applications, be familiar with file management, have excellent written and verbal skills. Analytical thinking skills Strong IT skills and knowledge including hardware, software and

networks A forensic approach to challenges An understanding of how hackers work

Personal Attributes/Qualities

Dynamic, intelligent and passionate about all things digital Ability to use logic and reasoning to identify the strengths and

weaknesses of IT systems To be thorough and pay attention to detail Go-getting attitude towards work Positive attitude and energy


Recommended