CYB300 Cyber Security Awareness
Course Overview
CYB300 - Cyber Security Awareness introduces students to fundamental issues faced by cybersecurity professionals.
Beginning with the identification and definition of vulnerabilities, malware and hacker methodology, this two-day course proceeds to explain appropriate defenses and mitigation processes to secure and defend information systems
Objectives
Provide detailed-discussion & hands-on practical application in the identification/classification of vulnerabilities & malware; explanation of the hacker threat & methodology & explore best-practice procedures & processes associated with security appliances & application.
Target Audience
Professionals seeking a fundamental understanding of cyber security issues, appropriate defense measures & industry-recommended mitigation processes.
Estimated Course Length: 24 hours
Module 1
Vulnerabilities & Malware introduces students to the types of vulnerabilities and malware that are prevalent in today’s cyber security landscape
- Types of Vulnerabilities
- Types of Malware
Module 2
Hacker Methodology & Threats provides background information regarding ways hackers exploit networks and networked devices. Discussions also include topics related to various threat actors like social engineers and insiders, and the various techniques these threat actors use to solicit information and/or damage/disrupt information systems
- Hacker Methodology & Mindset
- Social Engineering & Insider Threat
- Physical Security Threat
Module 3
Scanning & Assessment provides an overview of the various types of network and host-based scans required to assess and enumerate information systems, as well as, to aide in the identification of vulnerable services/applications.
- Network Scanning
- Vulnerability Assessment
Module 4
Defense in Depth introduces students to industry “best-practices” detailed through the implementation of a multi-pronged defense posture.
- Defense Mechanisms
- Introduction to Intrusion
- Detection/Prevention Systems
- Security Logs
- Personal Security Products
- Password Mechanisms
- Application Security
Module 5
Security Responsibilities & the Future of Cyber Security examines the different security responsibilities levied on an organization. These responsibilities include those outlined by local, state and federal law, as well as, those responsibilities which come as a result of adherence to industry guidelines or internal policies, processes and procedures.
- Security and Responsibilities
- Digital Forensics Basics
- Future Trends in Cyber Security
Course Overview
CYB300 - Cyber Security Awareness introduces students to fundamental issues faced by cybersecurity professionals.
Beginning with the identification and definition of vulnerabilities, malware and hacker methodology, this two-day course proceeds to explain appropriate defenses and mitigation processes to secure and defend information systems
Objectives
Provide detailed-discussion & hands-on practical application in the identification/classification of vulnerabilities & malware; explanation of the hacker threat & methodology & explore best-practice procedures & processes associated with security appliances & application.
Target Audience
Professionals seeking a fundamental understanding of cyber security issues, appropriate defense measures & industry-recommended mitigation processes.
Estimated Course Length: 24 hours
Module 1
Vulnerabilities & Malware introduces students to the types of vulnerabilities and malware that are prevalent in today’s cyber security landscape
- Types of Vulnerabilities
- Types of Malware
Module 2
Hacker Methodology & Threats provides background information regarding ways hackers exploit networks and networked devices. Discussions also include topics related to various threat actors like social engineers and insiders, and the various techniques these threat actors use to solicit information and/or damage/disrupt information systems
- Hacker Methodology & Mindset
- Social Engineering & Insider Threat
- Physical Security Threat
Module 3
Scanning & Assessment provides an overview of the various types of network and host-based scans required to assess and enumerate information systems, as well as, to aide in the identification of vulnerable services/applications.
- Network Scanning
- Vulnerability Assessment
Module 4
Defense in Depth introduces students to industry “best-practices” detailed through the implementation of a multi-pronged defense posture.
- Defense Mechanisms
- Introduction to Intrusion
- Detection/Prevention Systems
- Security Logs
- Personal Security Products
- Password Mechanisms
- Application Security
Module 5
Security Responsibilities & the Future of Cyber Security examines the different security responsibilities levied on an organization. These responsibilities include those outlined by local, state and federal law, as well as, those responsibilities which come as a result of adherence to industry guidelines or internal policies, processes and procedures.
- Security and Responsibilities
- Digital Forensics Basics
- Future Trends in Cyber Security