CSI100: Introduction to Cybersecurity / CSX Cybersecurity Fundamentals
Certification Level: Foundation | Cybersecurity Knowledge| Green Cyberwolf
Certificate Title: Certificate of Cybersecurity Fundamentals
Delivery Method: Live Classroom
Duration: Three Days | 0900 – 1800
NOTE: This course covers all subject areas (and more) to adequately prepares a student to pass the ISACA Cybersecurity Nexus | CSX Cybersecurity Fundamentals certification exam.
Here in Hong Kong, as well as globally, the demand for cybersecurity professionals exceeds the number of available qualified personnel. “The talent shortage is very bad because of the new surge in demand coupled with the small supply of well-trained cyber professionals,” says Mark O’Reilly, Asia managing director of a recruitment agency.
In Hong Kong, the Cyber Security Risk Circular, an edict issued by the Hong Kong Monetary Authority in September 2015, is now fueling an unprecedented demand for cyber security staff at banks. The result? Pay rises of up to 30% are now on offer. Due to the immense local, regional and global demand it is an excellent time to transition into a more interesting and lucrative career field.
The Certified Information Systems Security Professional (CISSP) designation is an excellent path to pursue, however, it requires five years of experience in information security. We developed this course as the first step a person would take to begin a career in information security.
This course is designed to rapidly introduce students to the fundamentals of cybersecurity using the eight (8) CISSP and five (5) ISACA CSX Cybersecurity Fundamentals domains as a foundation including:
What is cybersecurity?
Why is cybersecurity important?
What type of person are you?
What role will you play in cybersecurity?
Industry certifications and typical salaries
Fundamentals of information technology
Common information security terms
Security and Risk Management
o Protecting the security of assets including the implications of bring-your-own-device (BYOD); hardening of assets and data protection; and the role of change and configuration management.
Identity and Access Management
o The differences between identity and access management, the role access control plays, and common access control models.
Communication and Network Security
o Designing and protecting network security, network isolation and segmentation, the fundamentals of OSI and TCP, switches, firewalls, IDS vs. IPS, subnetting, IT vs. OT considerations, wireless networks and cloud security.
o Engineering and management of security through principles of secure design, security architecture and related threats, and cryptography.
Software Development Security
o Understanding, applying and enforcing software security through a software development life cycle, the software assurance maturity model, database management systems, database threats and controls, and web application development threats and protections.
Security Assessment and Testing
o Designing, performing and analyzing security through assessments and different test strategies, security controls testing, verification vs. validation, and event logging and correlations.
o Foundational concepts, investigations, incident management, and disaster recovery including the difference between events, alerts and incidents, the anatomy of a cyber attack and a cyber incident response, CERT attack vectors and incident categories, incident response triage activities, and digital forensics.
END OF COURSE EXAM
Lab 1 – During this lab the students will be tested on their knowledge of Security and Risk Management
Lab 2 – During this lab the students will be tested on their knowledge of Asset Security
Lab 3 – During this lab the students will be tested on their knowledge of Identity and Access Management
Lab 4 – During this lab the students will be tested on their knowledge of Communication and Network Security
Lab 5 – During this lab the students will be tested on their knowledge of Security Engineering
Lab 6 – During this lab the students will be tested on their knowledge of Software Development Security
Lab 7 – During this lab the students will be tested on their knowledge of Security Assessment and Testing
Lab 8 – During this lab the students will be tested on their knowledge of Security Operations
Why Choose Our Course?
The demand for skilled cybersecurity professionals is not going to lessen in the future. To help companies meet this demand we designed this course to give students their first introduction to the major aspects of information security. This course is ideal for anyone who wants to enter the interesting and diverse field of information security. Not every aspect of information security requires a person to be a technology expert and this course will help students better understand which facet is best suited for them.
What You Will Receive
In this course, you will receive the following:
You Will Be Able To
I developed this course to help companies meet the overwhelming demand for cybersecurity professionals. Unfortunately, there just are not enough people coming out of universities to keep up with the need so I wanted to help people jumpstart a career in information security. This course is also excellent for those that have gained various bits of information security knowledge but who really need to establish a solid foundation and help them connect the cyber security dots. This course really lays the foundation for all other topics within information security and will help students figure out which areas of most interest to them and which ones they may be best suited for.