3
DIGITAL SKILLS ACADEMY: Course Details Title: Cyber Security Intelligence No. of places: 15 Duration: Four Days (9:30am to 4:00pm) Dates: Day one - 4 November 2019 Day two - 11 November 2019 Day three - 18 November 2019 Day four - 25 November 2019 Venue Location Top Valley Academy, Top Valley Drive, Nottingham NG5 9AZ Course Overview Cyber security is fast becoming one of the most important roles in the tech sector as cyber criminals and hackers become ever more sophisticated. This four-day training course will provide a significant exposure to what it takes to develop an exciting and satisfying career with Cyber Intelligence. Outline Day 1: Module 1 - Understanding the threats This module concentrates on understanding the threats we face by defining what hackers are, their motivations, and the tools they use. This section takes a look at the processes involved in a hacking attack. Delegates will learn about foot printing, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks. Module 2 - The basics of Information Security This module is dedicated to understanding the basics of Information Security and looks at how an organisation might approach the task of securing their networks against attacks. In this section, delegates will learn about the CIA triad, the creation of an ISMS, risk management, the implementation of security controls, penetration testing and incident management. Day 2 Module 3 - Access Controls

 · Web viewDelegates will learn about foot printing, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks. Module 2 - The basics of

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1:  · Web viewDelegates will learn about foot printing, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks. Module 2 - The basics of

DIGITAL SKILLS ACADEMY:

Course Details

Title: Cyber Security Intelligence No. of places: 15

Duration: Four Days (9:30am to 4:00pm)

Dates: Day one - 4 November 2019

Day two - 11 November 2019

Day three - 18 November 2019

Day four - 25 November 2019

Venue Location

Top Valley Academy, Top Valley Drive, Nottingham NG5 9AZ

Course Overview

Cyber security is fast becoming one of the most important roles in the tech sector as cyber criminals and hackers become ever more sophisticated.

This four-day training course will provide a significant exposure to what it takes to develop an exciting and satisfying career with Cyber Intelligence.

OutlineDay 1:Module 1 - Understanding the threatsThis module concentrates on understanding the threats we face by defining what hackers are, their motivations, and the tools they use. This section takes a look at the processes involved in a hacking attack. Delegates will learn about foot printing, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks.

Module 2 - The basics of Information SecurityThis module is dedicated to understanding the basics of Information Security and looks at how an organisation might approach the task of securing their networks against attacks. In this section, delegates will learn about the CIA triad, the creation of an ISMS, risk management, the implementation of security controls, penetration testing and incident management.

Day 2Module 3 - Access ControlsThis module will look at the types of access control, physical access, controlling resource access, Microsoft Windows NTFS, Linus ext3/4, and cloud security.

Module 4 - Security Operations and AdministrationThis module covers a variety of topics including understanding how to support investigations, and requirements for investigation types; how to conduct logging and monitoring of activities; what to do to secure the provision of resources. It then goes on to explore how to apply foundational security operations concepts, employ resource protection techniques, conduct incident management and operate and maintain preventative measures.

Day 3Module 5 - Risk Identification, Monitoring and Analysis

Page 2:  · Web viewDelegates will learn about foot printing, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks. Module 2 - The basics of

DIGITAL SKILLS ACADEMY:

This module is focused on the importance of risk management, and explores how to assess risk, mitigate risk and integrate documents into risk management.

Module 6 - Incident Response and RecoveryThis module covers how to deploy incident handling and response architecture, contain and mitigate incidents, and prepare for a forensic investigation as a CSIRT.

Day 4Module 7 – CryptographyThis module highlights the current practices of core primitives, and emerging algorithms, techniques for analysis of these the protocols which use them.

Module 8 - Network and Communications SecurityThis module will cover how to apply secure design principles to network architecture; secure network components, the design and establishing of secure communication channels and how to prevent or mitigate network attacks.

Module 9 - Systems and Application SecurityThe final module of this four-day course covers the general guidelines for application security, securing web and mail applications, and databases.

Key training course outcomesThis introductory course will give you an essential cyber-security skills that will make you more employable in roles across the IT industry and will be particularly useful to those thinking about focusing on cyber security.

Desired Skills required?

The successful applicant will have a thorough understanding of computer systems and applications, be familiar with file management, have excellent written and verbal skills. Analytical thinking skills Strong IT skills and knowledge including hardware, software and

networks A forensic approach to challenges An understanding of how hackers work

Personal Attributes/Qualities

Dynamic, intelligent and passionate about all things digital Ability to use logic and reasoning to identify the strengths and

weaknesses of IT systems To be thorough and pay attention to detail Go-getting attitude towards work Positive attitude and energy