Course Methodology
This course utilizes presentations, group discussions, individual research and practical exercises to enhance key learning points
Course Objectives
By the end of the course, participants will be able to:
- Summarize key cyber terminologies, principles, and industry standards
- Apply technical, physical, and managerial controls and describe how they can assist in ensuring a robust and comprehensive security posture
- Recognize cybersecurity threats, including the identification of threat actors, their motivations, examination of common attack vectors, understanding of malware and analysis of current and relevant real world case studies
- Describe key technical aspects in cybersecurity, including authorization and authentication, encryption, network security fundamentals, and an overview of cloud computing
- Analyze business impacts, develop business continuity plans, and create disaster recovery strategies for ensuring organisational resilience and overcoming disruptive incidents
Target Audience
This course is suitable for those who work in, or seek to work with, cyber security functions or within the cyber or IT industries; as well as for anyone who requires an overview of cyber security and its impact on their role or organization.
Target Competencies
- Investigations
- Key technical aspects of cyber security
- Application of cyber security solutions
- Threat Intelligence
- Incident management and response
Fundamentals of Cyber Security
- Security concepts & definitions
- Cyber security standards
- Compliance and regulatory requirements
- High-profile cyber attacks
Security Controls
- Technical controls
- Physical controls
- Administrative controls
Understanding the threat
- Threat actors
- Common attack vectors
- Introduction to malware
Technical Aspects
- Authorization and authentication
- Encryption
- Network security fundamentals
- Cloud computing
Incident Management
- Overview of Incident Response
- The Incident Response lifecycle
- Introduction to Business Continuity Management and Disaster Recovery
- Incident response exercise