CSAP 301: Cyber Security for Aspiring Practitioners

♦ On-demand:

Cost: 750 USD*  |  Duration: 12 weeks  |  DCCSA Certification  |  Virtual Lab  |  E-books  |  Register

♦ On-site:

Cost: 1,250 USD*  |  Duration: 3 days (see our training schedule)  |  DCCSA Certification  |  Virtual Lab  |   Books (hard and digital copies)  |  Register

Course Overview

Cyber Security for Aspiring Practitioners is a cyber security training course that will prepare students for a career in cyber security. The key lessons are taught through illustrations and practical demonstrations of daily activities of a typical cyber security professional in an enterprise environment. This enables students to picture themselves in a job position before actually landing one. Unlike several other cyber security courses available on the market, CSAP 301 provides a fair balance between content and context, which enables students to retain the knowledge gained and also appreciate how their efforts will enable business objectives.

Regardless of your background, as long as you have keen interest in the field of cyber security, you will benefit immensely from this course.

Course Syllabus

In this module, students will learn about the fundamentals of cyber security and why it has become such an important field. Just as every organization needs physical security guards to protect its premises and other prized physical assets, every 21st century organization needs cyber security practitioners to adequately protect its information systems and other digital assets that are used to drive its business. In this module, we will examine how cyber security activities support the business objectives of organizations in eight (8) different industry verticals. Among other things, we will discuss career opportunities, possibilities, and professional certifications in addition to introducing students to key elements that determine the effectiveness of any cyber security program.
This module is packed with a lot of information about the motivations of threat actors and enterprise defenders. Effective threat and vulnerability management is arguably the best tool in the enterprise defender’s arsenal. Through six (6) real-world data breach case studies, student will learn from mistakes of victim organizations and become highly informed as to the most effective ways to reduce the likelihood of a successful cyber attack. Among other things, we will take a deep dive into cyber threat modeling and vulnerability management lifecycle.
In this module, we look at the concept of defense in depth (DiD) and take a deep dive into its practical application. Digital assets require multiple layers of defense around them in order to reduce the risk of successful compromise. Students will be introduced to different DiD domains and corresponding security technology products that can be leveraged to thwart possible attacks against every layer of defense.
Security incidents are inevitable–it’s a matter of “when” rather than “if” an incident will occur. When the incident eventually occurs, however, it is important to know what response actions are necessary. In this module, we will cover typical incident response phases, critical factors affecting the effectiveness of incident handling, incident severities and prioritization, practical (real-world) incident response examples, as well as key elements of incident response services as offered by specialist external incident responders. We will also introduce the student to the field of identity and access management (IAM) by explaining common IAM services and how they’re typically used.
Governance, Risk Management, and Compliance (GRC) is a combination of three complementary functions that help an organization (or department within an organization) meet its business objectives. A cyber security program without the right governance structure (i.e., direction and assurance that security management functions are being consistently performed) will not be delivering its intended business value. Similarly, the ultimate goal of every cyber security program, and indeed practitioner, is to reduce the risk of data breaches to acceptable levels. Risk is often expressed as a combination of two key attributes, namely the likelihood of a certain event occurring and the impact that such an event could have on the achievement of business objectives. Compliance helps ensure adherence to internal security practices and standards, as well as mandates from external regulatory institutions. This module introduces the student to the field of Governance, Risk Management and Compliance as it relates to cyber security.
The mission of every security professional is to ensure, as much as possible, that the adversary is kept out of his/her network. In an ever changing threat landscape, this is a tough ask. However, ensuring rapid security posture improvement is a realistic task. One of the ways by which this can be achieved is through constant evaluation of implemented defensive layers. In this cloud-based environment, students will gain hands on experience implementing different cyber security controls while also testing their effectiveness. The security controls in this lab cover most of the defensive layers discussed in Module 3 so this is where the student really gets to experience different threat mitigation techniques that cyber security practitioners adopt "on the job". This module introduces the student to the field of Governance, Risk Management and Compliance as it relates to cyber security.

Additional Information

WHO SHOULD ATTEND
  • Cyber Enthusiasts
  • IT Professionals
  • Students and College Graduates
  • Cyber Security Internship Seekers
WHAT YOU'LL GET
  • Access to online/on-site lectures
  • Access to course books (soft and hard copies)
  • Access to DIGISS virtual lab
  • Access to collaborative learning through threaded discussions
DELIVERY FORMAT
  • On-demand (self-paced) on your laptop, tablet, or mobile phone
  • On Site (subject to availability)
DURATION
  • On-demand: 4-12 Weeks**
  • On-site: 3 days***

Cost

On-demand: 750 USD*

On site: 1,250 USD*

*Students will get 10% discount. Please, contact us to obtain a discount code. Proof will be required. This offer is cannot be combined with any other offer.

**Committed and motivated students can finish the course in 4 weeks. However, online lectures and resources will be available to the students for up to 12 weeks

***On-site students will be provisioned access to our on-demand platform