Cyber Security Infrastructure Expert

7 June 2021 to 11 June 2021
Silicon Valley
3 Certificates Available
Days
Hours
Minutes
Seconds

World’s #1
Cyber SecurityEducation & Certification Seminars

TechXact, the global leader in Audit and Certification, and the largest provider of Professional Cyber Security Training Seminars, is hosting the next IDCA Training and Certification Seminars for the Expert Route on 7 June 2021 in Silicon Valley.

Cyber Security Infrastructure Expert®

5 Days. 3 Professional Certifications.

( + )

This course is well suited to professionals with varied disciplines and positions. Application and Business Security stakeholders, such as cybersecurity architects, engineers, designers, planners, operators and managers as well as professionals project management, sales, finance and compliance, attend CSES®. This course provides a comprehensive understanding of cybersecurity architecture, cryptography and secure communications, the overall design as well a good understanding of 5G network and the role of cybersecurity. How to leverage engineering in cybersecurity to address risk associated with the application and data is adequately addressed. It covers the security consideration for the Application Ecosystem and its 7 layers - adequately securing the application.

JOIN THE CYBER SECURITY PROFESSIONALS

IDCA is Global Reach. Local Delivery.

idcareferences
IDCA has designed the cyber security training course modules in a unique manner, covering a wide range of cloud topics, which are accompanied by live examples, hands-on case studies, and group activities. Classes can be attended in-classroom, virtual and online, at public venues as well as private sessions available to enterprise groups.

SCHEDULE

Great Networking opportunity with the industry's Elite. All courses include daily lectures, coffee breaks, beverages, lunch buffets, examination and certification.

Breakfast
team-10
Introduction and Overview
  • The outset of Cybersecurity
  • Governance
  • Risk Integration
  • Legislative Requirement
  • Security Requirement
  • Internal Threats
  • External Threats
  • Physical Security Threats
  • Cybercrime: Leading Business Risk Globally
  • Major Cyber Breaches
  • Cybersecurity Complexity
  • Infinity Paradigm
  • Definition of Cybersecurity
  • Cybersecurity Principles
Coffee Break
team-10
Cybersecurity Principles
  • The Layers
  • The Four Principles
  • Principle 1 & its key Activities
  • Principle 2 & its key Activities
  • Principle 3 & its key Activities
  • Principle 4 & its key Activities
  • Cybersecurity Attack
  • Security Threat to Networks
  • Two types of Attacks
  • Stages of an Attack
  • Cybersecurity Defense
  • Layered Security & Configuration of Perimeter
  • Firewall
  • Intrusion Detection & Penetration System
Lunch
team-10
Cybersecurity Risk & Consequences
  • Consequences of Attack
  • Maturity
  • Culture Shift
  • Appetite
  • Advice
  • Putting a Price on Risk
Coffee Break
Breakfast
team-10
Cybersecurity Trends
  • Understanding the threat landscape
  • Common Threat Agents and Vulnerabilities
  • Zero-Day Vulnerabilities
  • Attributes of Cyber Attack
  • Understanding the attributes of an Attack
  • Malware & Types of attack
  • Obfuscation and Mutations in Malware
Network Access Control & Wireless Network Security
  • An Overview of Network Access Control (NAC)
  • NAC Policies
  • The Network Access Control/Network Access Protection (NAC/NAP) Client/Agent
  • The Enforcement Points
  • Enforcement Point Action
  • Authentication and Authorization
  • NIST & Cybersecurity
  • ISO 27001 For Information Security
Coffee Break
team-10
Weaknesses of Existing Cybersecurity Standards
  • Available standards
  • Weaknesses of existing standards
  • Why IDCA is critical to filling the gaps
Cybersecurity in Cloud
  • Types of Cloud Assets
  • Compute Assets
  • Storage Assets
  • Network Assets
  • Asset Management Pipeline
  • Procurement Leaks
  • Processing Leaks
  • Finding Leaks
  • Protecting data in the cloud
  • Tokenization
  • Encryption
Cybersecurity for IoT and Edge/or 5G Computing
  • IoT Security Challenges & Landscape
  • Why IoT Security devices are targeted
  • Edge Motivation
  • Edge Definition
  • Evolution of IT Computing Models
  • Advantages of Edge Computing
  • Edge Layered Stack
  • OWASP (Open Web Application Security Project) Top 10 Internet of Things
Lunch
team-10
Examination Preparation
CSIS Examination
Breakfast
team-10
Cybersecurity Architecture History & Overview
  • Five Principles for Design of Cybersecurity Systems
  • Before Designing a system, the Context must be Established
  • Make it very Difficult for Attackers to Compromise your AE
  • The Design Must Make AE Downtime Very Difficult to Occur
  • Being Able to Detect Attacks
  • Reduce the Impact Should an Attack Occur
Coffee Break
team-10
Application Security Architecture
  • The Application Ecosystem
  • Application Security
  • Application Architecture
  • TOGAF Security Architecture Phases
  • SABSA Secure Application Development
  • Application Security Architecture Governance
  • Application Architecture Security Checklist
Lunch
team-10
Operating Systems & Virtualization
  • Overview
  • Attacker Model
  • Operating System Role and its Security Design Considerations
Coffee Break
team-10
Symmetric Key Ciphers & Wireless LAN Security
  • Overview
  • Block Ciphers
  • The Feistel Function in a DES Operation
  • Triple DES (3DES)
  • AES Encryption and why it was Developed
  • 128vs129vs256-Bit AES
  • Security Challenges with AES
  • Confidentiality Modes
  • Stream Cipher
  • WLAN Security Journey
  • Wi-Fi Protected Setup (WPS)
Breakfast
team-10
Hash & Authentication
  • Overview
  • Hash Function Properties
  • Authentication
  • Hash Function Properties
  • Hash Function History
  • Issues with SHA2
  • Migration to SHA-3
  • Hash Message Authentication Code (HMAC)
  • Key Derivation Function (KDF) & Pseudorandom Function (PRF)
  • Authentication Based Password
  • Dictionary Attack
  • Malware Password Cracking Technique
  • Unix Encrypted Password System
  • UNIX/LINUX Password Hash
  • The MD-5 Based Scheme
  • SSHA Scheme
  • Automated Password Generator
  • Online Authentication
  • One-Time Password (OTP) & Token
  • SecurID Simple Authentication & Security (SASL)
  • HMAC-Based One-Time Password (HOTP)
  • Cryptographic Token Initialization
Coffee Break
team-10
Data Encryption
  • Overview
  • The Need for Data Encryption
  • Case Study
  • Mathematical Introduction to Cryptography
  • Classical Cryptography
  • Euclidean Algorithm
  • Modular Arithmetic
Lunch
team-10
Public Key Cryptographic Infrastructure and Certificates
  • Overview
  • The Need for Data Encryption
  • Case Study
  • Mathematical Introduction to Cryptography
  • Classical Cryptography
  • Euclidean Algorithm
  • Modular Arithmetic
Coffee Break
team-10
Data Protection: Using Transport Layer Security
  • About TLS
  • Deploying TLS for Web Servers
  • TLS Secure Configuration Recommended
  • Protecting Mail Servers with TLS
  • Choosing Certificate Authority
  • CA Choice
  • Testing
  • TLS Recommended Cryptographic Profiles
Breakfast
team-10
Transport Layer Security v1.3
  • TLS 1.2 vs TLS1.3 – How they differ
  • Removed Algorithms and Ciphers
  • Faster and Refined Handshake
  • AEAD Bulk Encryption
  • Simplified Ciphers Suites
  • Support
  • Upgrade
  • Troubleshooting Common Errors
  • Running Old Versions
Cybersecurity Considerations for the 7-Layers of the Application Ecosystem
  • Application Layer
  • Platform Layer
  • Compute Layer
  • Information Technology Layer
  • Site Facility Infrastructure Layer
  • Site
  • Topology
Application Ecosystem Management: Cybersecurity Day-to-Day Operations
  • Controls Management
  • Security Controls
  • Asset Management
  • Change Management
  • The Importance of Managing Change
  • When should Changes be Made?
  • What are the Impact Changes bring?
  • The safeguard Effect of Internal Control in Change Management
  • Organizational Change Management
Coffee Break
team-10
Virtual Private Networks for Network Layer Security
  • Network Security Overview
  • Internet Protocol Security (IPSec)
  • IPSec Services
  • IPSec Modes
  • Security Association
  • The Encapsulating Security Protocol (ESP)
  • The Authentication Header
  • Anti-Replay Service
  • The internet Key Exchange (IKE)
Hardware Security
  • Hardware Design Process Brief Overview
  • Trust Root
  • Threat Model
  • Hardware Security Measurement
  • IoT Platforms Security Evaluation Standard
  • Secure Platform
  • Secure Element and Smartcard
  • Trusted Platform Module
Web & Mobile Security
  • Security Challenges
  • Background
  • Web & Mobile Ecosystem
  • Appification
  • OWASP Top 10 Mobile Security Risk unpacked
  • Exams
Lunch
team-10
Examination Preparation
CSES Examination
IDCA recognizes and utilizes competencies of wide range of international standards that are specific to their domains, such as International Organization for Standardization (ISO), Cloud Standards Customer Council, National Institute of Standards and Technology (NIST), Distributed Management Task Force (DMTF), The European Telecommunications Standards Institute (ETSI), Global Inter-Cloud Technology Forum (GICTF), International Telecommunications Union (ITU), Open Grid Forum (OGF), Open Cloud Consortium (OCC), OpenCloud Connect, TM Forum, Organization for the Advancement of Structured Information Standards (OASIS), etc

Book our virtual sessions now to get instant 5% off this event.

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)