MICROSOFT LOGO
MICROSOFT LOGO
קורס Cyber & Information Security

קורס CSTP – Cyber Security Technology Professional

CTR-906

carmel-website
carmel website
carmel-website
carmel-website

About this course

This is a 50-hour course m is designed to train cyber defense experts who can advise, guide, and make decisions on information protection tasks focusing on the technological-tactical aspects (without the administrative-government domain). These abilities will be acquired through a thorough familiarity with the strategies, tactics, techniques, and best practices in these diverse fields, including familiarity with the theory of attack and intelligence. Students will gradually learn the core features of the CSTP through lectures, self-guided homework assignments, and in-vivo practice labs. The Cyber Security Technology Professional program (CSTP) deals with the strategic level and integrates the knowledge and disciplines required for the expert architect.

Audience profile

This course requires a profound knowledge of system and networking aspects (Operating systems, networking, and ideally initial acquaintance with cyber defense tools) and is not suitable for beginners. BSC\BA grad\post in the field of Computer Science, Software\ Hardware Engineering may also apply.

At course completion

After completing this course, students will be able to:

  • The abilities to deal with the role of a cyber defense architect
  • Design a cyber defense system
  • Choose the right technological components, and implement them by using the best technique
  • Analyze understand and respond both rapidly and efficiently to cyber events
  • Make sense in the organizational cyber defense system

Course details

Module 1: Thinking Security – Introduction to Cyber Systems Management

This module will teach you all you need to know about cyber systems management. This program looks at track overview, the art of war, threats and vulnerabilities, attack and defense techniques, defense in depth as well as InfoSec engineering and common criteria.

Module 2: Cyber Technologies: Technologies, Tools, Techniques & Architecture This module is about the tools available, what their essence is, what functions they serve, and how to use them in combination with other tools and correct techniques. You’ll learn about the tools and techniques that complement one another as part of the technological response to threats, the operating system layer, networks, applications, special environments such as cloud and mobile devices, as well as end stations.

Module 3: Cyber Methodology / GRC: InfoSec Governance, Risk & Compliance

The goal of this course is to teach you about the intimate interrelationship with the field of government, risk management, and corporate compliance. This module delves into some layers such as organizational risk management because of a cyber event, compliance with management requirements, and the requirements of law and regulation in relevant aspects (e.g., the Protection of Privacy Law, Regulation 7809, 627). The ISCA-CISSP, ISACA-CISM, ISO 27000, SOX, DoD, PCI, ISC2-CISSP standards security, legislation, and industry regulations will be reviewed according to the daily practice.

Module 4: CISO Function and Role

This module educates students on CISO function and role, it delves into what the Information Security Manager does, what is the list of tasks and what is the correct order to carry them out, and how does the product of each action become the raw material of the next action and The Unwritten Law of CISO Functions.

Module 5: Incident Response

This module will teach you about SOC & Incident Response: SOC Operation, Incident response methodology, detection & Response-Lab: Implementing a SIEM Project Computer. You will learn about the forensic & Intellectual Rights: Computer Crime investigation, forensics & guarding, and Intellectual property.

Module 6: Hacking Defined Advanced

This module portrays the classical threats to information assets caused by a malicious human agent. The world of attacking and intelligence is taught in order to make the learner recognize the threats, vulnerabilities, techniques, and technologies used by the attacker.

Module 7: InfoSec Consulting Services

This module will explore Typical cyber services workshops: process and technological risk surveys, penetration testing, and GRC compliance reviews. Consulting types & areas, surveys, reports.

Module 8: CISSP Preparation

In this module, you will study the workshop complements (ISC) 2 's CISSP. You’ll learn how to report models, computer ethics, physical (environmental) security, operation security and TEST Marathon.

Prerequisites

  • Entry Level exam (American test)
  • Previous background in managing Windows (MCSA) or Linux networks, or in cyber or Software Development
  • BSC\BA grad\post in the field of Computer Science, Software\ Hardware Engineering or other fields
  • Readability to invest in self-guided homework assignments
מלאו פרטים ונחזור אליכם בהקדם

קורסים נוספים

למה לבחור בכרמל הדרכה?

אנחנו מציעים פתרונות איכותיים להדרכות מקצועיות שחוסכות לכם זמן ומשאבים, ומספקים לכם את הכלים לקחת את הכישורים שלכם עוד צעד קדימה!
carmel website

מרצים מובילים

בעלי ניסיון הדרכתי
ומעשי עשיר

carmel website

מגיעים אליכם

אתם קובעים את
מיקום הקורס והמועד

carmel website

תאוריה ותרגול

חומרי לימוד ומעבדות
רשמיות של מיקרוסופט הזמינים בענן

carmel website

תוכנית מותאמת

התאמה מלאה ואישית
לדרישות ולצרכי הארגון

פוסטים נוספים

מתחיל ב-28.10.2024

5 מפגשים

16:00 - 09:00
office 365
דילוג לתוכן