Cybersecurity Fundamentals - A Practical Course Training Course
Cybersecurity is the practice of protecting digital systems, devices, networks, and data against cyber attacks and threats. By implementing security controls, enterprise organizations or individuals can eliminate exposure to potential risks and vulnerabilities.
This instructor-led, live training (online or onsite) is aimed at IT professionals who wish to learn and apply the fundamentals of Cybersecurity practices, processes, and tools in their organization.
By the end of this training, participants will be able to:
- Understand the Cybersecurity concepts, definitions, architecture, and principles.
- Learn how to secure and protect digital assets (networks, systems, applications, and data).
- Implement security models, frameworks, operational techniques, and incident handling.
- Evaluate and mitigate the impact of cyber attacks, risks, threats, and vulnerabilities.
- Gain insights on cybersecurity challenges with emerging technologies.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
- Overview of Cybersecurity concepts and definitions
- Information security vs Cybersecurity
Security Architecture and Frameworks
- Enterprise architecture framework
- OSI model and definitions
- Defense in depth
- Information flow control
- Isolation and segmentation
- Logging, monitoring, and detection
- Encryption techniques and tools
Security of Assets (Networks, Systems, Applications, and Data)
- Identity management
- Risk assessment
- Vulnerability management
- Penetration testing
- Network security
- Operating system security
- Application security
- Data security
Security Operations and Responses
- Event vs Incident
- Legal and regulatory compliance
- Digital forensics
- Incident categories
- Business continuity and disaster recovery
- Incident response and handling
Common Challenges with Emerging Technologies
- Threat landscape
- Advanced persistent threats
- Mobile technology risks
- Consumerization of IT (IoT, Big Data, and AI)
- Risks of Cloud Computing
Summary and Next Steps
Requirements
- n/a
Audience
- IT professionals
Open Training Courses require 5+ participants.
Cybersecurity Fundamentals - A Practical Course Training Course - Booking
Cybersecurity Fundamentals - A Practical Course Training Course - Enquiry
Cybersecurity Fundamentals - A Practical Course - Consultancy Enquiry
Consultancy Enquiry
Testimonials (4)
the live examples
Lee-Ann Cozyn - Vodacom
Course - Cybersecurity Fundamentals - A Practical Course
Made me aware on how important it is to secure my personal and organizations information/data
Tebogo Skosana - Vodacom SA
Course - Cybersecurity Fundamentals - A Practical Course
Was very interactive and the trainer was very knowledgeable and answered all questions in some cases over sharing and going the extra mile in satisfying the question which was rather excellent ..
Fagmie Mondell - Vodacom SA
Course - Cybersecurity Fundamentals - A Practical Course
The subject matter was very interesting and was able to relate this to my current role at Vodacom.
Malcolm Frank - Vodacom SA
Course - Cybersecurity Fundamentals - A Practical Course
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Ecuador (online or onsite) is aimed at sysadmins who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in Ecuador (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Android Security
14 HoursAndroid is an open platform for mobile devices such as handsets and tablets. It has a large variety of security features to make developing secure software easier; however, it is also missing certain security aspects that are present in other hand-held platforms. The course gives a comprehensive overview of these features, and points out the most critical shortcomings to be aware of related to the underlying Linux, the file system and the environment in general, as well as regarding using permissions and other Android software development components.
Typical security pitfalls and vulnerabilities are described both for native code and Java applications, along with recommendations and best practices to avoid and mitigate them. In many cases discussed issues are supported with real-life examples and case studies. Finally, we give a brief overview on how to use security testing tools to reveal any security relevant programming bugs.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn the security solutions on Android
- Learn to use various security features of the Android platform
- Get information about some recent vulnerabilities in Java on Android
- Learn about typical coding mistakes and how to avoid them
- Get understanding on native code vulnerabilities on Android
- Realize the severe consequences of unsecure buffer handling in native code
- Understand the architectural protection techniques and their weaknesses
- Get sources and further readings on secure coding practices
Audience
Professionals
FreeIPA for Administrators
14 HoursThis instructor-led, live training in Ecuador (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Ecuador (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP for Linux Systems
7 HoursOpenLDAP is open source software for implementing the LDAP (Lightweight Directory Access Protocol), which allows management and access to information directories. Jest is a popular directory server that can be used to store and share data about users, groups, network resources and other objects on the network.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Ecuador (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Ecuador (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Ecuador (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.