Cyber Security Infrastructure Specialist®

csis

Cyber Security Infrastructure Specialist®

2 Days, 1 Professional Certification

This course is fundamental for professionals with varied disciplines and positions. Application and Business Security stakeholders, cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSIS® to enrich their knowledge beyond the industry buzzwords. The CSIS® course provides end-to-end coverage of the cybersecurity concepts, fundamentals, components, infrastructure, standards, disciplines, latest trends and best practices to support the integrity and security of the Application Ecosystem (AE)®.

2 Days Classroom Session
1 Professional Certification Available
Virtual Sessions Available
Private Organization Training Available
This is a popular course

Course Description

This course is fundamental for professionals with varied disciplines and positions. Application and Business Security stakeholders, cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSIS® to enrich their knowledge beyond the industry buzzwords. The CSIS® course provides end-to-end coverage of the cybersecurity concepts, fundamentals, components, infrastructure, standards, disciplines, latest trends and best practices to support the integrity and security of the Application Ecosystem (AE)®.

Who should take this course?

Cyber Security Professionals including but not limited: Security Analyst, Security Engineer, Security Architect, Security Administrator, Security Software Developer, Cryptographer, Cryptanalyst, Security Consultant. Furthermore this course is suitable for Application Developers, Finance Professionals, Data Center Designers/Engineers, Data Center Planners, Project Managers, Legal & Compliance Professionals, College Students & Graduates, Business Continuity Experts.

what you study

The course will provide comprehensive coverage of the main Cybersecurity concepts, components, principles, standards, Cyber Security technology trends and advancements, the application of Cybersecurity practice to the security and integrity of the Application Ecosystem® and latest trends, enabling professionals to make the most appropriate Cyber Security choices for design, build and operation of a resilient enterprise or product that is secure by design.

Learning Outcomes

Learn the Cybersecurity language and buzzwords. Learn Cybersecurity principles. Understand Cybersecurity Threat Landscape. Review Cybersecurity standards and frameworks. Learn how to cybersecure the Application Ecosystem (AE).

Prerequisites

  • None.

Course Features

  • Course Code CSIS
  • Sessions 2
  • Duraion 2 Days
  • Track Management
    & Engineering
  • Language English
  • Public Yes
  • Virtual Availability Yes
  • Private Availability Yes
  • Certificate Yes
  • Assessment Yes
  • Day 1

    Introduction

    Cybersecurity Overview

    • The outset of Cybersecurity
    • Governance
    • Risk Integration
    • Legislative Requirement
    • Security Requirement
    • Internal Threats
    • External Threats
    • Physical Security Threats
    • Cybercrime: Leading Business Risk Globally
    • Major Cyber Breaches
    • Cybersecurity Complexity
    • Infinity Paradigm
    • Definition of Cybersecurity
    • Cybersecurity Principles

    Cybersecurity Principles

    • The Layers
    • The Four Principles
    • Principle 1 & its key Activities
    • Principle 2 & its key Activities
    • Principle 3 & its key Activities
    • Principle 4 & its key Activities

    Cybersecurity Dimensions: Attack & Defense

    • Cybersecurity Attack
    • Security Threat to Networks
    • Two types of Attacks
    • Stages of an Attack
    • Cybersecurity Defense
    • Layered Security & Configuration of Perimeter
    • Firewall
    • Intrusion Detection & Penetration System

    Cybersecurity Risk & Consequences

    • Consequences of Attack
    • Maturity
    • Culture Shift
    • Appetite
    • Advice
    • Putting a Price on Risk

    Day 2

    Cybersecurity Trends

    • Understanding the threat landscape
    • Common Threat Agents and Vulnerabilities
    • Zero-Day Vulnerabilities
    • Attributes of Cyber Attack
    • Understanding the attributes of an Attack
    • Malware & Types of attack
    • Obfuscation and Mutations in Malware

    Weaknesses of Existing Cybersecurity Standards

    • Available standards
    • Weaknesses of existing standards
    • Why IDCA is critical to filling the gaps

    Network Access Control & Wireless Network Security

    • An Overview of Network Access Control (NAC)
    • NAC Policies
    • The Network Access Control/Network Access Protection (NAC/NAP) Client/Agent
    • The Enforcement Points
    • Enforcement Point Action
    • Authentication and Authorization
    • NIST & Cybersecurity
    • ISO 27001 For Information Security

    Cybersecurity in Cloud

    • Types of Cloud Assets
    • Compute Assets
    • Storage Assets
    • Network Assets
    • Asset Management Pipeline
    • Procurement Leaks
    • Processing Leaks
    • Finding Leaks
    • Protecting data in the cloud
    • Tokenization
    • Encryption

    Cybersecurity for IoT and Edge/or 5G Computing

    • IoT Security Challenges & Landscape
    • Why IoT Security devices are targeted
    • Edge Motivation
    • Edge Definition
    • Evolution of IT Computing Models
    • Advantages of Edge Computing
    • Edge Layered Stack
    • OWASP (Open Web Application Security Project) Top 10 Internet of Things

    Examination

    IDCA Courses

    Save & Share Cart
    Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
    Back Save & Share Cart
    Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
    Your cart email sent successfully :)