Cyber Security’s Foundations – Training
Take a look on how to calculate the cyber risk, how to architect security solutions, and the way in which we manage an incident; by following the five steps of the NIST Framework for Cyber Security: Identify, Protect, Detect, Respond, and Recover.
You’ll review some of the other key frameworks in use today, including IT general controls and COBIT 5. And also understand the main control standards used in ISO 27000, and NIST Federal Controls as well as the Payment Card Industry’s Data Security Standard.
You’ll get a detailed description of the cyber kill chain by explaining the variety of threats that can affect individuals, businesses, and governments; covering both state sponsored cyber espionage and the cybercrime industry.
This intensive course explains how Cyber Security can be architectured to ensure business success using a methodology known as the Sherwood Applied Business Security Architecture, or SABSA, by presenting the main types of cyber security mechanisms.
Preventive measures are never fully successful, and so it’s important to understand how to manage an incident. I’ll cover the processes for preparing for, managing, and recovering from an incident. When you finish this course, you’ll have a great understanding of cyber security issues, covering both the threats to information and the framework to defeat those threats and how to implement the framework using a disciplined architectural approach
Cyber Security or IT Security, is the protection of systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.
It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
The field is of growing importance due to the increasing reliance on computer systems and the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi – and the growth of “smart” devices, including smartphones, televisions and tiny devices as part of the Internet of Things.
Download Cyber Security’s Foundations for ICT Professionals Manual
Interested? Please, contact us