Course Code: bespokesecuirty
Duration: 49 hours
Prerequisites:
  • An understanding of ___
  • Experience with ___
  • ___ programming experience

Audience

  • ___
  • ___
  • ___
Overview:

___ is ___.

This instructor-led, live training (online or onsite) is aimed at beginner-level / intermediate-level / advanced-level ___ who wish to use ___ to ___.

By the end of this training, participants will be able to:

  • Install and configure ___.
  • ___. 
  • ___. 
  • ___. 

Format of the Course

  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.
Course Outline:

Day 1: Introduction and Computer Systems Security (Part I & II)

  • Introduction to Security
  • Overview of cybersecurity principles and importance.
  • Fundamentals of Computer Systems Security (Part I)
  • Basics of system security, threats, and vulnerabilities.
  • Computer Systems Security (Part II)
  • Advanced system security measures and best practices.
  • OS Hardening and Virtualization
  • Techniques for operating system hardening and the role of virtualization in security.
  • Interactive Session: Practical OS Hardening
  • Hands-on activities on securing operating systems.

Day 2: Application Security and Network Foundations

  • Application Security
  • Secure coding practices and application vulnerabilities.
  • Network Design Elements
  • Understanding secure network design principles.
  • Networking Protocols and Threats
  • Overview of common protocols and associated threats.
  • Network Perimeter Security
  • Techniques for securing the network perimeter.
  • Lab Session: Network Security Implementations
  • Practical exercise in implementing network security measures.

Day 3: Advanced Network Security and Physical Safeguards

  • Securing Network Media and Devices
  • Best practices for securing network hardware and transmission media.
  • Physical Security and Authentication Models
  • Understanding physical security measures and various authentication models.
  • Access Control Methods and Models
  • Deep dive into access control mechanisms and methodologies.
  • Vulnerability and Risk Assessment
  • Techniques for assessing and mitigating risks.
  • Workshop: Risk Assessment and Access Control
  • Hands-on risk assessment and access control planning.

Day 4: Monitoring, Encryption, and PKI

  • Monitoring and Auditing
  • Strategies for effective security monitoring and auditing.
  • Encryption and Hashing Concepts
  • Basics of cryptographic techniques and hashing.
  • PKI and Encryption Protocols
  • Understanding Public Key Infrastructure and encryption protocols.
  • Redundancy and Disaster Recovery
  • Planning for redundancy and disaster recovery strategies.
  • Case Studies: Encryption and Disaster Recovery
  • Analyzing real-world scenarios and applications.

Day 5: Social Engineering, Policies, and Course Wrap-Up

  • Social Engineering, User Education, and Facilities Security
  • Tactics of social engineering, user awareness training, and securing physical facilities.
  • Policies and Procedures
  • Importance of security policies and procedures in an organization.
  • Final Review and Q&A
  • Review of key concepts and open question-answer session.
  • Group Activity: Policy Development
  • Hands-on exercise in developing security policies.
  • Course Evaluation and Certification Preparation
  • Feedback session and guidance for Security+ certification.