Course Overview:
This course provides a comprehensive overview of the cybersecurity domains. The course is delivered in six separate parts: Cybersecurity Introduction and Overview, Cybersecurity Concepts, Security Architecture Principles, Security of Networks, Systems, Applications & Data, Incident Response and Security implications & Adaption of Evolving Technology.
This course is based on the CSX Cybersecurity fundamentals and will be delivered by an experienced information security professional.
This course is designed to be an entry point into the cybersecurity industry. The certificate and related training are an ideal way to get started on a career in cyber security.
- The ideal candidate is a business professional who is seeking to learn more about the area of Cybersecurity.
- A recent college graduate who is looking to start a career in Cybersecurity.
The course will lead to more in-depth security course if the candidate would like to take another step on the road to a more advanced course.
Course Aims and Objectives:
The overall aim of this course is to provide the students with the fundamental cybersecurity knowledge which can be built upon if the candidate so wishes to do so.
The Course will enable you to:
- Demonstrate your understanding of the principles that frame and define cyber security and the initial role of cyber security professionals in protecting enterprise data
- Add a credential to you resume/CV that will distinguish you from other candidate for advancement or a new job
- Stay ahead of the curve on your current career path or start your new cybersecurity career
Course Outline:
Domain 1: Cyber Security Concepts
Cyber Security Concepts is the first domain covered in this official CSX Fundamentals training program. The various areas or topics students spend time on can be found below:
CSX Fundamentals Domain 1 Lessons
- Cyber security principles used to manage risks related to the use, processing, storage and transmission of information or data.
- Security Management
- Risk Management Processes, including steps and methods for assessing risk.
- Threat Actors
- Cyber Security Roles
- Common Adversary Tactics, Techniques and Procedures (TTPs)
- Relevant Laws, Policies, Procedures and Governance Requirements.
- Cyber Security Controls
Domain 2: Cyber Security Architecture Principles
Domain 2 focuses on Cyber Security Architecture Principles, and students will learn about the following topics:
CSX Fundamentals Domain 2 Lessons
- Network Design Processes, to include understanding of security objectives, operational objectives and trade-offs.
- Security System Design Methods, Tools and Techniques.
- Network Access, Identity and Access Management
- Information Technology (IT) Security Principles and Methods
- Network Security Architecture Concepts, including topology, protocols, components and principles
- Malware Analysis Concepts and Methodology
- Intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
- Defense in Depth Principles and Network Security Architecture
- Encryption Algorithms
- Cryptography
- Encryption Methodologies
- The process of traffic flows across the network (e.g. transmission and encapsulation)
- Network Protocols, Dynamic Host Configuration Protocol, and Directory Services
Domain 3: Security of Networks, Systems, Applications and Data
This is the third domain covered in this course, and it’s called Security of Networks, Systems, Applications and Data. Students can expect to review the following topics:
CSX Fundamentals Domain 3 Lessons
- Vulnerability Assessment Tools and their Capabilities
- Basic System Administration, Network and Operating System Hardening Techniques
- Risk Associated with Virtualizations
- Penetration Testing
- Network Systems Management Principles, Modules, Methods and Tools
- Remote Access Technology
- Unix Command Line
- System and Application Security Threats and Vulnerabilities
- System Life Cycle Management Principles, including software security and usability
- Local Specialized System Requirements for Safety, Performance and Reliability.
- System and Application Security Threats and Vulnerabilities
- Social Dynamics of Computer Attackers in a Global Context
- Secure Configuration Management Techniques
- Capabilities and Applications of Network Equipment including Hubs, Routers, Switches, Bridges, Servers, Transmission Media and Related Hardware.
- Communication Methods, Principles and Concepts that Support the Network Infrastructure
- Common Networking Protocols and Services and how they Interact to Provide Network Communications.
- Different Types of Network Communication
- Virtualization Technologies and Virtual Machine Development and Maintenance
- Application Security
- Risk Threat Assessment
Domain 4: Incident Response
Incident Response is the fourth domain reviewed in this course and it focuses on the following areas:
CSX Fundamentals Domain 4 Lessons
- Incident Categories and Response
- Business Continuity/Disaster Recovery
- Incident Response and Handling Methodologies
- Security Event Correlation Tools
- Processes for Seizing and Preserving Digital Evidence
- Types of Digital Forensics Data
- Basic Concepts and Practices of Processing Digital Forensics Data
- Anti-Forensics Tactics, Techniques and Procedures (TTPS)
- Common Forensic Tool Configuration and Support Applications
- Network Traffic Analysis Methods
- Which System Files Contain Relevant Information and Where to Find Those System Files
Domain 5: Security Implications and Adoption of Evolving Technology
Security Implications and Adoption of Evolving Technology is the fifth and final domain covered in this official CSX Fundamentals training program. It’s in this domain where students can expect to learn about the following topics:
CSX Fundamentals Domain 5 Lessons
- Emerging Technology and Associated Security Issues, Risks and Vulnerabilities
- Risk Associated with Mobile Computing
- Cloud Concepts Around Data and Collaboration
- Risk of Moving Applications and Infrastructure to the Cloud
- Risk Associated with Outsourcing
- Supply Chain Risk Management Processes and Practices