Price
£656.76
Course Type
Online
Duration
180 hours
Date
Various dates throughout the year

About this course

This course provides a comprehensive, trustworthy framework of practices for assuring information security. Students will learn how the various roles and functions within Cybersecurity practice can be combined and leveraged to produce a secure organization. Concepts will not be presented as stagnant theory; instead, they are interwoven in a real world adventure story that runs throughout. This approach grabs students' attention and assists them in visualizing the application of the content to real-world issues that they will face in their professional life. The content of the course is based on the Department of Homeland Security's Essential Body of Knowledge (EBK) for IT Security.

Prerequisite(s): None

Cybersecurity Module 1
Overview of Information Security

  • Importance of Information Security
  • Essential Body of Knowledge (EBK)
  • Finding an Appropriate Model
  • Strategic Governing Process
  • Global Roadmap for Security
  • EBK Competency Areas
  • Roles in EBK Framework
  • Implementation and Adjustment
  • Adapting Best Practice
  • Developing Solutions from EBK
  • Chief Information Security Officer (CISO)
  • Context and Scope

Cybersecurity Module 2
Information Security Team

  • Defining Executive Roles
  • Role of CISO
  • Architect's Role
  • Data Security Function
  • Functional Security Roles
  • Information Security Team
  • IT Security Engineer
  • Designing the Security Response
  • Corollary Roles for Security
  • Physical Security Professional
  • Privacy Professional
  • Procurement Professional

Cybersecurity Module 3
EBK Competencies

  • Data Security
  • Standard Models for Securing Data
  • Cryptography
  • Digital Forensics
  • Ensuring Integrity
  • Routine Evaluations
  • Enterprise Continuity
  • Successful Preparation
  • Anticipating Disasters
  • Incident Management
  • Structured Response
  • Consistent Execution

Cybersecurity Module 4
System Development and Maintenance

  • Training and Awareness
  • Ensuring Secure Behavior
  • Build a Knowledgeable Workforce
  • Effective Review Process
  • IT Systems Operations and Maintenance
  • Strategic Planning
  • Controls Framework
  • Maintaining Operational Capability
  • Network and Telecommunications Security
  • Managed Networks
  • Boundaries of Trust
  • Network Security Function

Cybersecurity Module 5
Controls and Regulations

  • Personnel Security
  • Screening and Hiring
  • Formal Code of Conduct
  • Physical Security
  • Maintaining Secure Access
  • Perimeter Controls
  • Effective Procurement System
  • Effective Supply Chains
  • Identifying Trusted Suppliers
  • Legal and Regulatory Compliance
  • Role of Compliance Officer
  • Evaluation Programs

Cybersecurity Module 6
Risk Management

  • Risk Management Planning Process
  • Risk Management Controls
  • Targeting Security Controls
  • Measuring Risk Management Process
  • Strategic Management
  • Defining Control Objectives
  • Details of Implementation
  • Making Informed Decisions
  • System and Application Security
  • Measuring Against Benchmarks
  • Operational Framework
  • Information-Based Management Process
Enquire now

Enquire now