Cyber Security Infrastructure Expert®
Cyber Security Infrastructure Expert®
5 Days, 3 Professional Certifications
This course is well suited to professionals with varied disciplines and positions. Application and Business Security stakeholders, such as cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSES®. This course provides a comprehensive understanding of cybersecurity architecture, cryptography and secure communications, the overall design as well a good understanding of 5G network and the role of cybersecurity. How to leverage engineering in cybersecurity to address risk associated with the application and data is adequately addressed. It covers the security consideration for the Application Ecosystem and its 7 layers - adequately securing the application.
Upcoming CSIE® Events
Sorry no post found.
Course Description
This course is well suited to professionals with varied disciplines and positions. Application and Business Security stakeholders, such as cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSES®. This course provides a comprehensive understanding of cybersecurity architecture, cryptography and secure communications, the overall design as well a good understanding of 5G network and the role of cybersecurity. How to leverage engineering in cybersecurity to address risk associated with the application and data is adequately addressed. It covers the security consideration for the Application Ecosystem and its 7 layers - adequately securing the application.
Who should take this course?
- Cyber Security Professionals including but not limited
- Security Analyst.
- Security Engineer.
- Security Architect.
- Security Administrator.
- Security Software Developer.
- Cryptographer.
- Cryptanalyst.
- Security Consultant.
- Application Developers
- Finance Professionals
- Data Center Designers/Engineers
- Data Center Planners
- Project Managers
- Legal & Compliance Professionals
- College Students & Graduates
- Business Continuity Experts
what you study
The course provides comprehensive coverage of the Cybersecurity Architecture History & Overview, Cybersecurity Architecture Governance, Reference Security Architecture, Cybersecurity Architecture Strategy, Cybersecurity Architecture Design Document, Cybersecurity Architecture & Operations, Cybersecurity Architecture Practical Designs, Intrusion Detection/Penetration System, Cybersecure Communications, Public Cryptography & Key Infrastructure Certificates, Secure Socket Layer (SSL) & Transport Layer Security (TLS) Protocols, cybersecurity considerations for the 7-layers of the Application Ecosystem, 5G network security, trends in cybersecurity architecture technology and the future of cybersecurity architecture.
Learning Outcomes
- Learn how to design cyber security solutions
- Learn cyber security best practices to keep the whole system cyber safe, e.g. Application Security
- Learn to design and engineer robust cyber security architectures and approaches, e.g. defense in-depth, layered security, security-by-design, resilience-by-design.
- Learn cyber security principles beyond the CIA Triads.
Prerequisites
- None.
Course Features
- CSIS®
- CSES®
Day 1
Introduction
Cybersecurity Overview
The outset of Cybersecurity
Governance
Risk Integration
Legislative Requirement
Security Requirement
Internal Threats
External Threats
Physical Security Threats
Cybercrime: Leading Business Risk Globally
Major Cyber Breaches
Cybersecurity Complexity
Infinity Paradigm
Definition of Cybersecurity
Cybersecurity Principles
Cybersecurity Principles
The Layers
The Four Principles
Principle 1 & its key Activities
Principle 2 & its key Activities
Principle 3 & its key Activities
Principle 4 & its key Activities
Cybersecurity Dimensions: Attack & Defense
Cybersecurity Attack
Security Threat to Networks
Two types of Attacks
Stages of an Attack
Cybersecurity Defense
Layered Security & Configuration of Perimeter
Firewall
Intrusion Detection & Penetration System
Cybersecurity Risk & Consequences
Consequences of Attack
Maturity
Culture Shift
Appetite
Advice
Putting a Price on Risk
Day 2
Cybersecurity Trends
Understanding the threat landscape
Common Threat Agents and Vulnerabilities
Zero-Day Vulnerabilities
Attributes of Cyber Attack
Understanding the attributes of an Attack
Malware & Types of attack
Obfuscation and Mutations in Malware
Weaknesses of Existing Cybersecurity Standards
Available standards
Weaknesses of existing standards
Why IDCA is critical to filling the gaps
Network Access Control & Wireless Network Security
An Overview of Network Access Control (NAC)
NAC Policies
The Network Access Control/Network Access Protection (NAC/NAP) Client/Agent
The Enforcement Points
Enforcement Point Action
Authentication and Authorization
NIST & Cybersecurity
ISO 27001 For Information Security
Cybersecurity in Cloud
Types of Cloud Assets
Compute Assets
Storage Assets
Network Assets
Asset Management Pipeline
Procurement Leaks
Processing Leaks
Finding Leaks
Protecting data in the cloud
Tokenization
Encryption
Cybersecurity for IoT and Edge/or 5G Computing
IoT Security Challenges & Landscape
Why IoT Security devices are targeted
Edge Motivation
Edge Definition
Evolution of IT Computing Models
Advantages of Edge Computing
Edge Layered Stack
OWASP (Open Web Application Security Project) Top 10 Internet of Things
Examination
Day 1
Introduction
Secure by Design Principles
Five Principles for Design of Cybersecurity Systems
Before Designing a system, the Context must be Established
Make it very Difficult for Attackers to Compromise your AE
The Design Must Make AE Downtime Very Difficult to Occur
Being Able to Detect Attacks
Reduce the Impact Should an Attack Occur
Application Security Architecture
The Application Ecosystem
Application Security
Application Architecture
TOGAF Security Architecture Phases
SABSA Secure Application Development
Application Security Architecture Governance
Application Architecture Security Checklist
Operating Systems & Virtualization
Overview
Attacker Model
Operating System Role and its Security Design Considerations
Symmetric Key Ciphers & Wireless LAN Security
Overview
Block Ciphers
The Feistel Function in a DES Operation
Triple DES (3DES)
AES Encryption and why it was Developed
128vs129vs256-Bit AES
Security Challenges with AES
Confidentiality Modes
Stream Cipher
WLAN Security Journey
Wi-Fi Protected Setup (WPS)
Day 2
Hash & Authentication
Overview
Hash Function Properties
Authentication
Hash Function Properties
Hash Function History
Issues with SHA2
Migration to SHA-3
Hash Message Authentication Code (HMAC)
Key Derivation Function (KDF) & Pseudorandom Function (PRF)
Authentication Based Password
Dictionary Attack
Malware Password Cracking Technique
Unix Encrypted Password System
UNIX/LINUX Password Hash
The MD-5 Based Scheme
SSHA Scheme
Automated Password Generator
Online Authentication
One-Time Password (OTP) & Token
SecurID Simple Authentication & Security (SASL)
HMAC-Based One-Time Password (HOTP)
Cryptographic Token Initialization
Data Encryption
Overview
The Need for Data Encryption
Case Study
Mathematical Introduction to Cryptography
Classical Cryptography
Euclidean Algorithm
Modular Arithmetic
Public Key Cryptographic Infrastructure and Certificates
Overview
The Need for Data Encryption
Case Study
Mathematical Introduction to Cryptography
Classical Cryptography
Euclidean Algorithm
Modular Arithmetic
Data Protection: Using Transport Layer Security
About TLS
Deploying TLS for Web Servers
TLS Secure Configuration Recommended
Protecting Mail Servers with TLS
Choosing Certificate Authority
CA Choice
Testing
TLS Recommended Cryptographic Profiles
Day 3
Transport Layer Security v1.3
TLS 1.2 vs TLS1.3 – How they differ
Removed Algorithms and Ciphers
Faster and Refined Handshake
AEAD Bulk Encryption
Simplified Ciphers Suites
Support
Upgrade
Troubleshooting Common Errors
Running Old Versions
Virtual Private Networks for Network Layer Security
Network Security Overview
Internet Protocol Security (IPSec)
IPSec Services
IPSec Modes
Security Association
The Encapsulating Security Protocol (ESP)
The Authentication Header
Anti-Replay Service
The internet Key Exchange (IKE)
Hardware Security
Hardware Design Process Brief Overview
Trust Root
Threat Model
Hardware Security Measurement
IoT Platforms Security Evaluation Standard
Secure Platform
Secure Element and Smartcard
Trusted Platform Module