Course Outline

Introduction

  • Overview of cybersecurity landscape
  • Importance of cybersecurity in the digital age
  • Role of analysts in cybersecurity

Fundamentals of Cybersecurity

  • Understanding cyber threats: Malware, Phishing, Ransomware, etc.
  • Basic cybersecurity principles: CIA Triad (Confidentiality, Integrity, Availability)
  • Common attack vectors

Cybersecurity Frameworks and Standards

  • Overview of NIST Cybersecurity Framework
  • ISO/IEC 27001, GDPR, and other relevant standards
  • Best practices in cybersecurity

Network Security Basics

  • Understanding network architecture
  • Key concepts: Firewalls, VPNs, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS)
  • Network security protocols

Threats to Network Security

  • Network-based attacks: DDoS, Man-in-the-Middle (MitM), etc.
  • Exploiting network vulnerabilities

Securing the Network

  • Implementing firewalls and VPNs
  • Network segmentation and zero-trust architecture
  • Best practices for network security

Understanding Data Security

  • Types of data: Structured vs. Unstructured
  • Data classification and governance
  • Data protection strategies

Introduction to Encryption

  • Basics of encryption: Symmetric vs. Asymmetric
  • SSL/TLS and Public Key Infrastructure (PKI)
  • Data encryption best practices

Protecting Sensitive Data

  • Data Loss Prevention (DLP) strategies
  • Encryption of data at rest and in transit
  • Implementing access control measures

Introduction to Incident Response

  • The incident response lifecycle
  • Building an incident response team
  • Incident response plans and playbooks

Threat Intelligence and Analysis

  • Gathering and analyzing threat intelligence
  • Tools and techniques for threat analysis
  • Using SIEM (Security Information and Event Management) systems

Incident Detection and Response

  • Identifying and responding to security incidents
  • Forensic analysis and evidence collection
  • Reporting and documenting incidents

Understanding Emerging Cyber Threats

  • Latest trends in cyber threats (e.g., AI-driven attacks, IoT vulnerabilities)
  • Understanding Advanced Persistent Threats (APTs)
  • Preparing for future cybersecurity challenges

Ethical Hacking and Penetration Testing

  • Basics of ethical hacking
  • Penetration testing methodologies
  • Conducting vulnerability assessments

Summary and Next Steps

Requirements

  • Basic understanding of IT concepts and networking
  • Familiarity with operating systems and basic command-line tools

Audience

  • Analysts
  • IT professionals
 21 Hours

Delivery Options

Private Group Training

Our identity is rooted in delivering exactly what our clients need.

  • Pre-course call with your trainer
  • Customisation of the learning experience to achieve your goals -
    • Bespoke outlines
    • Practical hands-on exercises containing data / scenarios recognisable to the learners
  • Training scheduled on a date of your choice
  • Delivered online, onsite/classroom or hybrid by experts sharing real world experience

Private Group Prices RRP from £5700 online delivery, based on a group of 2 delegates, £1800 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.

Contact us for an exact quote and to hear our latest promotions


Public Training

Please see our public courses

Testimonials (5)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories