About this course
This is a 50-hour course m is designed to train cyber defense experts who can advise, guide, and make decisions on information protection tasks focusing on the technological-tactical aspects (without the administrative-government domain). These abilities will be acquired through a thorough familiarity with the strategies, tactics, techniques, and best practices in these diverse fields, including familiarity with the theory of attack and intelligence. Students will gradually learn the core features of the CSTP through lectures, self-guided homework assignments, and in-vivo practice labs. The Cyber Security Technology Professional program (CSTP) deals with the strategic level and integrates the knowledge and disciplines required for the expert architect.
Audience profile
This course requires a profound knowledge of system and networking aspects (Operating systems, networking, and ideally initial acquaintance with cyber defense tools) and is not suitable for beginners. BSC\BA grad\post in the field of Computer Science, Software\ Hardware Engineering may also apply.
At course completion
After completing this course, students will be able to:
- The abilities to deal with the role of a cyber defense architect
- Design a cyber defense system
- Choose the right technological components, and implement them by using the best technique
- Analyze understand and respond both rapidly and efficiently to cyber events
- Make sense in the organizational cyber defense system
Course details
Module 1: Thinking Security – Introduction to Cyber Systems Management
This module will teach you all you need to know about cyber systems management. This program looks at track overview, the art of war, threats and vulnerabilities, attack and defense techniques, defense in depth as well as InfoSec engineering and common criteria.
Module 2: Cyber Technologies: Technologies, Tools, Techniques & Architecture This module is about the tools available, what their essence is, what functions they serve, and how to use them in combination with other tools and correct techniques. You’ll learn about the tools and techniques that complement one another as part of the technological response to threats, the operating system layer, networks, applications, special environments such as cloud and mobile devices, as well as end stations.
Module 3: Cyber Methodology / GRC: InfoSec Governance, Risk & Compliance
The goal of this course is to teach you about the intimate interrelationship with the field of government, risk management, and corporate compliance. This module delves into some layers such as organizational risk management because of a cyber event, compliance with management requirements, and the requirements of law and regulation in relevant aspects (e.g., the Protection of Privacy Law, Regulation 7809, 627). The ISCA-CISSP, ISACA-CISM, ISO 27000, SOX, DoD, PCI, ISC2-CISSP standards security, legislation, and industry regulations will be reviewed according to the daily practice.
Module 4: CISO Function and Role
This module educates students on CISO function and role, it delves into what the Information Security Manager does, what is the list of tasks and what is the correct order to carry them out, and how does the product of each action become the raw material of the next action and The Unwritten Law of CISO Functions.
Module 5: Incident Response
This module will teach you about SOC & Incident Response: SOC Operation, Incident response methodology, detection & Response-Lab: Implementing a SIEM Project Computer. You will learn about the forensic & Intellectual Rights: Computer Crime investigation, forensics & guarding, and Intellectual property.
Module 6: Hacking Defined Advanced
This module portrays the classical threats to information assets caused by a malicious human agent. The world of attacking and intelligence is taught in order to make the learner recognize the threats, vulnerabilities, techniques, and technologies used by the attacker.
Module 7: InfoSec Consulting Services
This module will explore Typical cyber services workshops: process and technological risk surveys, penetration testing, and GRC compliance reviews. Consulting types & areas, surveys, reports.
Module 8: CISSP Preparation
In this module, you will study the workshop complements (ISC) 2 ‘s CISSP. You’ll learn how to report models, computer ethics, physical (environmental) security, operation security and TEST Marathon.
Prerequisites
- Entry Level exam (American test)
- Previous background in managing Windows (MCSA) or Linux networks, or in cyber or Software Development
- BSC\BA grad\post in the field of Computer Science, Software\ Hardware Engineering or other fields
- Readability to invest in self-guided homework assignments