Course Code:
bespokesecuirty
Duration:
49 hours
Prerequisites:
- An understanding of ___
- Experience with ___
- ___ programming experience
Audience
- ___
- ___
- ___
Overview:
___ is ___.
This instructor-led, live training (online or onsite) is aimed at beginner-level / intermediate-level / advanced-level ___ who wish to use ___ to ___.
By the end of this training, participants will be able to:
- Install and configure ___.
- ___.
- ___.
- ___.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline:
Day 1: Introduction and Computer Systems Security (Part I & II)
- Introduction to Security
- Overview of cybersecurity principles and importance.
- Fundamentals of Computer Systems Security (Part I)
- Basics of system security, threats, and vulnerabilities.
- Computer Systems Security (Part II)
- Advanced system security measures and best practices.
- OS Hardening and Virtualization
- Techniques for operating system hardening and the role of virtualization in security.
- Interactive Session: Practical OS Hardening
- Hands-on activities on securing operating systems.
Day 2: Application Security and Network Foundations
- Application Security
- Secure coding practices and application vulnerabilities.
- Network Design Elements
- Understanding secure network design principles.
- Networking Protocols and Threats
- Overview of common protocols and associated threats.
- Network Perimeter Security
- Techniques for securing the network perimeter.
- Lab Session: Network Security Implementations
- Practical exercise in implementing network security measures.
Day 3: Advanced Network Security and Physical Safeguards
- Securing Network Media and Devices
- Best practices for securing network hardware and transmission media.
- Physical Security and Authentication Models
- Understanding physical security measures and various authentication models.
- Access Control Methods and Models
- Deep dive into access control mechanisms and methodologies.
- Vulnerability and Risk Assessment
- Techniques for assessing and mitigating risks.
- Workshop: Risk Assessment and Access Control
- Hands-on risk assessment and access control planning.
Day 4: Monitoring, Encryption, and PKI
- Monitoring and Auditing
- Strategies for effective security monitoring and auditing.
- Encryption and Hashing Concepts
- Basics of cryptographic techniques and hashing.
- PKI and Encryption Protocols
- Understanding Public Key Infrastructure and encryption protocols.
- Redundancy and Disaster Recovery
- Planning for redundancy and disaster recovery strategies.
- Case Studies: Encryption and Disaster Recovery
- Analyzing real-world scenarios and applications.
Day 5: Social Engineering, Policies, and Course Wrap-Up
- Social Engineering, User Education, and Facilities Security
- Tactics of social engineering, user awareness training, and securing physical facilities.
- Policies and Procedures
- Importance of security policies and procedures in an organization.
- Final Review and Q&A
- Review of key concepts and open question-answer session.
- Group Activity: Policy Development
- Hands-on exercise in developing security policies.
- Course Evaluation and Certification Preparation
- Feedback session and guidance for Security+ certification.