Cyber Security Infrastructure Expert®

csie-virtual
( + )

Cyber Security Infrastructure Expert®

5 Days, 3 Professional Certifications

This course is well suited to professionals with varied disciplines and positions. Application and Business Security stakeholders, such as cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSES®. This course provides a comprehensive understanding of cybersecurity architecture, cryptography and secure communications, the overall design as well a good understanding of 5G network and the role of cybersecurity. How to leverage engineering in cybersecurity to address risk associated with the application and data is adequately addressed. It covers the security consideration for the Application Ecosystem and its 7 layers - adequately securing the application.

5 Days Classroom Session
3 Professional Certifications Available
Virtual Sessions Available
Private Organization Training Available
This is a popular course

Course Description

This course is well suited to professionals with varied disciplines and positions. Application and Business Security stakeholders, such as cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSES®. This course provides a comprehensive understanding of cybersecurity architecture, cryptography and secure communications, the overall design as well a good understanding of 5G network and the role of cybersecurity. How to leverage engineering in cybersecurity to address risk associated with the application and data is adequately addressed. It covers the security consideration for the Application Ecosystem and its 7 layers - adequately securing the application.

Who should take this course?

  • Cyber Security Professionals including but not limited
    • Security Analyst.
    • Security Engineer.
    • Security Architect.
    • Security Administrator.
    • Security Software Developer.
    • Cryptographer.
    • Cryptanalyst.
    • Security Consultant.
  • Application Developers
  • Finance Professionals
  • Data Center Designers/Engineers
  • Data Center Planners
  • Project Managers
  • Legal & Compliance Professionals
  • College Students & Graduates
  • Business Continuity Experts

what you study

The course provides comprehensive coverage of the Cybersecurity Architecture History & Overview, Cybersecurity Architecture Governance, Reference Security Architecture, Cybersecurity Architecture Strategy, Cybersecurity Architecture Design Document, Cybersecurity Architecture & Operations, Cybersecurity Architecture Practical Designs, Intrusion Detection/Penetration System, Cybersecure Communications, Public Cryptography & Key Infrastructure Certificates, Secure Socket Layer (SSL) & Transport Layer Security (TLS) Protocols, cybersecurity considerations for the 7-layers of the Application Ecosystem, 5G network security, trends in cybersecurity architecture technology and the future of cybersecurity architecture.

Learning Outcomes

  • Learn how to design cyber security solutions
  • Learn cyber security best practices to keep the whole system cyber safe, e.g. Application Security
  • Learn to design and engineer robust cyber security architectures and approaches, e.g. defense in-depth, layered security, security-by-design, resilience-by-design.
  • Learn cyber security principles beyond the CIA Triads.

Prerequisites

  • None.

Course Features

  • Course Code CSIE
  • Sessions 5
  • Duraion 5 Days
  • Track Cyber Security Expert
  • Language English
  • Public Yes
  • Virtual Availability Yes
  • Private Availability Yes
  • Certificate Yes
  • Assessment Yes

    Day 1

    Data Center Overview

    • Data Center History
    • Data Center Definitions
    • The Data Center Beast
    • Data Center Downtime & Outage
    • Present Data Center Standards
    • Future of Data Center Standards

    The Infinity Paradigm®

    • Application Ecosystem (AE)℠
    • Core & Pyramid Models
    • The Organization
    • The 7 Abstraction Layers
      • Application Layer
      • Platform Layer
      • Compute Layer
      • ITI Layer
      • SFI Layer
      • Site Layer
      • Topology Layer
    • Application Delivery Model (ADM)
    • Application Delivery Infrastructure (ADI)
    • Data Center Node (DCN)
    • Logical Infrastructure
    • Physical Infrastructure

    Grading Systems

    • Data Center Tiers & Classes
    • Data Center Grade Levels
    • AER, OER, EER, RER, SER
    • Efficacy Score Rating

    Data Center Development

    • Data Center Tiers & Classes
    • Data Center Development Process
    • Data Center Phases

    Site, Civil & Architecture

    • Data Center Site Selection & Criteria
    • Data Center Site Proximity, Hazard & Risks
    • Data Center Topology
    • Data Center Structure
    • Data Center Construction
    • Data Center Interior Fit-out
    • Data Center Space Relationships
    • Data Center CR, ER, MDA, HDA and ZDA
    • Data Center Raised Floor System
    • Data Center Grounding & Bounding
    • Data Center Earthing

    Power Systems

    • Data Center Site Selection & Criteria
    • Logical Electrical Flow
    • DC, AC, W, AV Rates and Concepts
    • Utility Service
    • High Voltage Systems
    • Switchgear
    • Transformers
    • Low Voltage Systems
    • Uninterruptible Power Supply (UPS) Systems
    • UPS Configurations
    • Battery and Battery Types
    • Generators
    • Fuel Tanks
    • Power Distribution
    • ATS, STS
    • Power Cabling
    • Busbar Trunking System (BTS)
    • EPO
    • Grounding
    • Lightning Protection System
    • Alternative Power Sources
    • EF, MF, EMF, EMI
    • EMF & EMP Shielding

    Day 2

    Data Center Cooling

    • Environmental Air
    • Cooling Capacity
    • Precision Cooling
    • Direct Expansion (DX) Systems
    • Non-DX Systems
    • Cooling Methodologies
    • Cold-Aisle / Hot- Aisle
    • CRAC/CRAH
    • Cooling Topologies:
      • Open CRAC Systems
      • Aisle Containment (Cold & Hot)
      • In-Row Cooling
      • In-Rack Cooling
    • Cooling Towers
    • Chillers
    • Data Center Water Supply

    Fire Protection

    • Fire Types and Classes
    • Smoke and Heat Detection
    • Aspiratory Detection and Sensing
    • Sprinkler Systems
    • Gas Suppression Systems & Agents (FM200, Novec, etc.)
    • Fire Prevention Technology
    • Data Center Safety

    Data Center Security

    • Physical Infrastructure Security
    • CCTV
    • Access Control
    • Mantraps
    • Barbwires
    • Security Protocols & Procedures
    • IT Infrastructure Security

    Data Center Structured Cabling

    • Cabling Layout
    • Patching & Termination
    • Labeling
    • Intelligence

    IT Infrastructure

    • System
    • Storage
    • Networks
    • Virtualization & Cloud
    • External Telecom Connectivity
    • High Availability Designs

    Data Center Efficiency

    • Cost of Energy
    • Power Usage
    • Power Usage Effectiveness (PUE)
    • Data Center Infrastructure Efficiency (DCIE)
    • Applications and Hosting Models
    • Applications
    • Application Delivery Architecture
    • App Tiers
    • Colo vs Managed Hosting
    • ASP Hosting
    • Public & Private Clouds

    Monitoring and Management

    • MMS, EMS, EPMS, BMS
    • Temperature Monitoring
    • Leak Detection
    • Integration

    Network Operation Center (NOC)

    • Systems
    • Procedures
    • Control

    Data Center Trends

    • Latest Data Center Technology Trends
    • Latest Data Center Industry Trends

    Examination

    Day 1

    Introduction

    Secure by Design Principles

    • Five Principles for Design of Cybersecurity Systems
    • Before Designing a system, the Context must be Established
    • Make it very Difficult for Attackers to Compromise your AE
    • The Design Must Make AE Downtime Very Difficult to Occur
    • Being Able to Detect Attacks
    • Reduce the Impact Should an Attack Occur

    Application Security Architecture

    • The Application Ecosystem
    • Application Security
    • Application Architecture
    • TOGAF Security Architecture Phases
    • SABSA Secure Application Development
    • Application Security Architecture Governance
    • Application Architecture Security Checklist

    Operating Systems & Virtualization

    • Overview
    • Attacker Model
    • Operating System Role and its Security Design Considerations

    Symmetric Key Ciphers & Wireless LAN Security

    • Overview
    • Block Ciphers
    • The Feistel Function in a DES Operation
    • Triple DES (3DES)
    • AES Encryption and why it was Developed
    • 128vs129vs256-Bit AES
    • Security Challenges with AES
    • Confidentiality Modes
    • Stream Cipher
    • WLAN Security Journey
    • Wi-Fi Protected Setup (WPS)

    Day 2

    Hash & Authentication

    • Overview
    • Hash Function Properties
    • Authentication
    • Hash Function Properties
    • Hash Function History
    • Issues with SHA2
    • Migration to SHA-3
    • Hash Message Authentication Code (HMAC)
    • Key Derivation Function (KDF) & Pseudorandom Function (PRF)
    • Authentication Based Password
    • Dictionary Attack
    • Malware Password Cracking Technique
    • Unix Encrypted Password System
    • UNIX/LINUX Password Hash
    • The MD-5 Based Scheme
    • SSHA Scheme
    • Automated Password Generator
    • Online Authentication
    • One-Time Password (OTP) & Token
    • SecurID Simple Authentication & Security (SASL)
    • HMAC-Based One-Time Password (HOTP)
    • Cryptographic Token Initialization

    Data Encryption

    • Overview
    • The Need for Data Encryption
    • Case Study
    • Mathematical Introduction to Cryptography
    • Classical Cryptography
    • Euclidean Algorithm
    • Modular Arithmetic

    Public Key Cryptographic Infrastructure and Certificates

    • Overview
    • The Need for Data Encryption
    • Case Study
    • Mathematical Introduction to Cryptography
    • Classical Cryptography
    • Euclidean Algorithm
    • Modular Arithmetic

    Data Protection: Using Transport Layer Security

    • About TLS
    • Deploying TLS for Web Servers
    • TLS Secure Configuration Recommended
    • Protecting Mail Servers with TLS
    • Choosing Certificate Authority
    • CA Choice
    • Testing
    • TLS Recommended Cryptographic Profiles

    Day 3

    Transport Layer Security v1.3

    • TLS 1.2 vs TLS1.3 – How they differ
    • Removed Algorithms and Ciphers
    • Faster and Refined Handshake
    • AEAD Bulk Encryption
    • Simplified Ciphers Suites
    • Support
    • Upgrade
    • Troubleshooting Common Errors
    • Running Old Versions

    Virtual Private Networks for Network Layer Security

    • Network Security Overview
    • Internet Protocol Security (IPSec)
    • IPSec Services
    • IPSec Modes
    • Security Association
    • The Encapsulating Security Protocol (ESP)
    • The Authentication Header
    • Anti-Replay Service
    • The internet Key Exchange (IKE)

    Hardware Security

    • Hardware Design Process Brief Overview
    • Trust Root
    • Threat Model
    • Hardware Security Measurement
    • IoT Platforms Security Evaluation Standard
    • Secure Platform
    • Secure Element and Smartcard
    • Trusted Platform Module

    Web & Mobile Security

    Security Challenges

    Background

    Web & Mobile Ecosystem

    Appification

    OWASP Top 10 Mobile Security Risk unpacked

    Examination

    IDCA Courses

    Save & Share Cart
    Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
    Back Save & Share Cart
    Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
    Your cart email sent successfully :)