

Cyber security
Overview:
Introduction:
Cybersecurity involves the structured protection of information systems from threats that compromise data integrity, confidentiality, and availability. In technical environments, cybersecurity requires the integration of secure network design, access control models, encryption protocols, and incident detection strategies. This training program presents a comprehensive approach to cybersecurity management with emphasis on both conceptual frameworks and technical dimensions relevant to infrastructure protection and risk mitigation.
Program Objectives:
By the end of this program, participants will be able to:
-
Define the core concepts and domains of cybersecurity.
-
Identify key elements of secure network architecture and system configurations.
-
Explore procedures and models for access control, encryption, and identity management.
-
Outline strategies for detecting, analyzing, and responding to cybersecurity incidents.
-
Evaluate tools and techniques for maintaining security across digital assets and infrastructure.
Targeted Audience:
-
IT technicians and system administrators.
-
Cybersecurity specialists and analysts.
-
Technical support staff in network and infrastructure environments.
-
Professionals working in secure system configuration and digital operations.
-
Technical support staff preparing for cybersecurity responsibilities.
Program Outline:
Unit 1:
Core Concepts in Cybersecurity:
-
Definitions and objectives of cybersecurity.
-
Cybersecurity domains, including confidentiality, integrity, and availability.
-
Threat vectors, including internal, external, and advanced persistent threats APT.
-
Overview of standards, including ISO/IEC 27001, NIST, and CIS Controls.
-
Terminology used in risk, vulnerability, and threat modeling.
Unit 2:
Network Security and Protocol Safeguards:
-
Network segmentation and perimeter defense.
-
Firewalls, IDS/IPS systems, and VLAN configurations.
-
Securing protocols HTTPS, SSH, SFTP, TLS.
-
IP addressing, subnets, and routing considerations.
-
Basics of packet filtering and traffic analysis.
Unit 3:
Access Control and Identity Management:
-
Models of access control, including MAC, DAC, RBAC, ABAC.
-
Authentication methods, including MFA, biometrics, token-based systems.
-
Directory services, Active Directory, LDAP.
-
Privileged access management principles.
-
Tools for managing user identity and access auditing.
Unit 4:
Endpoint and Device Protection:
-
Types of endpoint threats,including malware, keyloggers, remote access tools.
-
Antivirus and endpoint detection and response (EDR) solutions.
-
Device hardening techniques, group policies and patch management.
-
USB control and removable media restrictions.
-
Key activities used for logging and alerting configuration for endpoints.
Unit 5:
Secure Configuration and Hardening:
-
System baseline configuration and checklists techniques.
-
How to disable unnecessary services and ports.
-
Secure boot processes and BIOS/UEFI settings.
-
How to manage system logs and auditing trails.
-
File integrity monitoring tools.
Unit 6:
Cryptography and Data Protection:
-
Types of cryptography, symmetric vs. asymmetric.
-
How is encryption applied in storage and transmission.
-
SSL/TLS configurations and certificate management methods.
-
Oversight on hashing algorithms and data validation.
-
Public Key Infrastructure (PKI) concepts.
Unit 7:
Incident Detection and Response:
-
Incident response process and roles.
-
Event monitoring tools, including SIEM systems and syslog.
-
Indicators of compromise (IOCs) and threat intelligence feeds.
-
Techniques for log analysis and anomaly detection.
-
Escalation paths and documentation procedures.
Unit 8:
Cybersecurity in Cloud and Virtual Environments:
-
Cloud deployment models IaaS, PaaS, SaaS and shared responsibility.
-
Virtualization and container security, including VMs, Docker, and Kubernetes.
-
Cloud identity and access control models.
-
How to maintain a secure cloud storage and data residency.
-
Encryption and monitoring frameworks in cloud environments.
Unit 9:
Compliance, Governance, and Risk Management:
-
Regulatory frameworks, including GDPR, HIPAA, and PCI DSS.
-
Information security governance principles.
-
Risk assessment criteria and threat classification.
-
Business continuity and disaster recovery planning steps.
-
The role of audit readiness and documentation management.
Unit 10:
Cybersecurity Trends and Professional Development:
-
Zero Trust Architecture and its principles.
-
The significant role of AI and automation in cybersecurity tools.
-
Threat evolution, including deepfakes, AI-driven malware, and quantum risk.
-
Role-based certification paths, including CompTIA Security+, CEH, and CISSP.