Cybersecurity Foundations

Course Information

This course is unavailable at this time.

Key Contact

Client Services

Learn More

Course Fees

Login Here
Federated login for the Member Wiki

Course Description

Gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.
Learn about current threat trends across the Internet and their impact on organizational security through lecture, labs and breakout discussion groups.

In the Cybersecurity Foundations course, you will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will also work with live viruses, including botnets, worms, and Trojans.

Course Benefits

  • Expert trainers, certified instructor-led training
  • In-person and online course delivery options
  • Catered lunch, snacks, coffee and light breakfast foods daily

Who Should Attend?

  • Network professionals looking to advance their knowledge and explore cybersecurity as a career path.
  • Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level.
  • Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities.

What You Will Learn

  • Current cyber threats and cybersecurity site references
  • Government-mandated directives and compliance requirements
  • Cyber roles required to successfully design secure systems
  • The attack cycle perpetrated by malicious hackers
  • Enterprise policy requirements
  • Best strategies for securing the enterprise with layered defenses
  • How security zones and detailed logging augment information assurance
  • Forensic challenges and incident response planning
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Industry recommendations for maintaining secure access control
  • Standards-based cryptographic solutions for securing communications