Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Certificate
Course Outline
DOMAIN 1: CYBERSECURITY CONCEPTS
- 1.1 Knowledge of information assurance (IA) principles used to manage risks related to the use, processing, storage, and transmission of information or data.
- 1.2 Knowledge of security management.
- 1.3 Knowledge of risk management processes, including steps and methods for assessing risk.
- 1.4 Knowledge of the organisation's enterprise information technology (IT) goals and objectives.
- 1.5 Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored], and third generation [nation state sponsored]).
- 1.6 Knowledge of information assurance (IA) principles and organisational requirements relevant to confidentiality, integrity, availability, authentication, and non-repudiation.
- 1.7 Knowledge of common adversary tactics, techniques, and procedures (TTPs) in assigned areas of responsibility (e.g., historical country-specific TTPs, emerging capabilities).
- 1.8 Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).
- 1.9 Knowledge of relevant laws, policies, procedures, and governance requirements.
- 1.10 Knowledge of relevant laws, policies, procedures, or governance as they relate to work that may impact critical infrastructure.
DOMAIN 2: CYBERSECURITY ARCHITECTURE PRINCIPLES
- 2.1 Knowledge of network design processes, including an understanding of security objectives, operational objectives, and trade-offs.
- 2.2 Knowledge of security system design methods, tools, and techniques.
- 2.3 Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).
- 2.4 Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarised zones, encryption).
- 2.5 Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures, utilising standards-based concepts and capabilities.
- 2.6 Knowledge of network security architecture concepts, including topology, protocols, components, and principles (e.g., application of defence in depth).
- 2.7 Knowledge of malware analysis concepts and methodology.
- 2.8 Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies.
- 2.9 Knowledge of defence in depth principles and network security architecture.
- 2.10 Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE]).
- 2.11 Knowledge of cryptology.
- 2.12 Knowledge of encryption methodologies.
- 2.13 Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open Systems Interconnection model [OSI]).
- 2.14 Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol)./li>
DOMAIN 3: SECURITY OF NETWORK, SYSTEM, APPLICATION AND DATA
- 3.1 Knowledge of computer network defence (CND) and vulnerability assessment tools, including open-source tools, and their capabilities.
- 3.2 Knowledge of basic system administration, network, and operating system hardening techniques.
- 3.3 Knowledge of risks associated with virtualisation.
- 3.4 Knowledge of penetration testing principles, tools, and techniques (e.g., Metasploit, NeoSploit).
- 3.5 Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
- 3.6 Knowledge of remote access technology concepts.
- 3.7 Knowledge of systems administration concepts.
- 3.8 Knowledge of the Unix command line.
- 3.9 Knowledge of system and application security threats and vulnerabilities.
- 3.10 Knowledge of system lifecycle management principles, including software security and usability.
- 3.11 Knowledge of local specialised system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.
- 3.12 Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channels, replay attacks, return-oriented attacks, malicious code).
- 3.13 Knowledge of the social dynamics of computer attackers in a global context.
- 3.14 Knowledge of secure configuration management techniques.
- 3.15 Knowledge of capabilities and applications of network equipment, including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
- 3.16 Knowledge of communication methods, principles, and concepts that support the network infrastructure.
- 3.17 Knowledge of common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications.
- 3.18 Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Local Area Network [WLAN], Wireless Wide Area Network [WWAN]).
- 3.19 Knowledge of virtualisation technologies and virtual machine development and maintenance.
- 3.20 Knowledge of application vulnerabilities.
- 3.21 Knowledge of information assurance (IA) principles and methods that apply to software development.
- 3.22 Knowledge of risk threat assessment.
DOMAIN 4: INCIDENT RESPONSE
- 4.1 Knowledge of incident categories, incident responses, and timelines for responses.
- 4.2 Knowledge of disaster recovery and continuity of operations plans.
- 4.3 Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.
- 4.4 Knowledge of incident response and handling methodologies.
- 4.5 Knowledge of security event correlation tools.
- 4.6 Knowledge of investigative implications of hardware, operating systems, and network technologies.
- 4.7 Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody).
- 4.8 Knowledge of types of digital forensics data and how to recognise them.
- 4.9 Knowledge of basic concepts and practices of processing digital forensic data.
- 4.10 Knowledge of anti-forensics tactics, techniques, and procedures (TTPs).
- 4.11 Knowledge of common forensic tool configuration and support applications (e.g., VMWare, Wireshark).
- 4.12 Knowledge of network traffic analysis methods.
- 4.13 Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to locate those system files.
DOMAIN 5: SECURITY OF EVOLVING TECHNOLOGY
- 5.1 Knowledge of new and emerging information technology (IT) and information security technologies.
- 5.2 Knowledge of emerging security issues, risks, and vulnerabilities.
- 5.3 Knowledge of risks associated with mobile computing.
- 5.4 Knowledge of cloud concepts around data and collaboration.
- 5.5 Knowledge of risks associated with moving applications and infrastructure to the cloud.
- 5.6 Knowledge of risks associated with outsourcing.
- 5.7 Knowledge of supply chain risk management processes and practices.
Requirements
There are no set pre-requisites for attending this course
28 Hours
Testimonials (3)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects