Set a rock-solid foundation for your network, users, and data by learning the basics of cybersecurity. Explore key frameworks, threats, and strategies for responding to incidents.
Overview
Syllabus
Introduction
- Understanding the cybersecurity frameworks and standards
- What you should know
- Understanding the Cyber Kill Chain
- Pre-cyber threats
- The emergence of the cyber threats
- Botnets and the cybercrime industry
- Cloaking and alternate data streams
- Hiding using processes
- Controlling the target through a rootkit
- Phishing and watering holes
- Understanding advanced persistent threats
- Ransomware: A modern form of extortion
- Cryptomining
- Hardware implants and other cyber FUD
- The Orange Book: Early concepts in computer security
- Understanding the NIST Cybersecurity Framework
- Adopting the NIST Cybersecurity Framework
- Understanding the basics of cyber risk
- Analyzing cyber threats and controls
- Recording, reporting, and the risk context
- An advanced risk framework
- Managing security with COBIT
- COBIT for operational security
- Introduction to cybersecurity controls
- Cybersecurity control framework
- Cybersecurity standards of good practice
- Architecting for security
- Protecting payment card data
- Clouding the issues
- Securing things on the internet
- Ensuring security is effective
- Incident management basics
- Measuring incident management maturity
- Detecting an attack
- Hunting for threats
- Responding to an incident
- Communications plan and notification
- Cybersecurity goes global
- Understanding cyber norms
- Cybil and the Global Forum on Cyber Expertise
- The Traffic Light Protocol
- What's next
Taught by
Malcolm Shore