Essential Cyber security Principles and Techniques
- CPE Credits: 8
- Prerequisites: None
- Learning Level: Basic
- Instructional Method: Group/Live
- Field of Study: Information Technology – Technical
Course Revision Date: March 1, 2023
Course Description
On the fence regarding the critical role cybersecurity plays. Consider for a moment that in 2017, there was a….
- 13% Overall increase in reported vulnerabilities
- 29% Increase in industrial control system (ICS) related vulnerabilities
- 54% Increase in mobile malware variants
- 46% Increase in new ransomware variants
- 80% Increase in new malware on Macs
- 600% Increase in attacks against IoT devices (Source: Internet Threat Security Report, Symantec, 2018)
Institutions globally deploy a wide array of information technology devices, systems, and applications across broad geographic areas. Equally critical is the deployment and retention of associated digital assets. While these physical assets can be identified and traced using RFID technologies, cloud services and databases, understanding and controlling the cybersecurity resilience of operating systems, applications, networks and the digital assets transmitted through these systems and applications, is a greater challenge.
This one-day course is designed to address this cybersecurity challenge. More specifically, this course will provide participants with a general but, thorough examination of the primary principles and critical techniques, which are the foundation of a successful cybersecurity program.
Audience
This course is intended for:
- Internal and external audit professionals, desiring to gain a broader exposure and better understanding of cyber security.
- Technical professionals (e.g., IT audit, telecoms, programming) looking to expand their technical knowledge and investigate cyber security as a new career path.
- Professionals desiring to advance their understanding of basic cyber security principles including threats, mitigating controls, and organizational responsibilities.
- Executives and managers requiring a basic but, thorough understanding of cyber security and its crucial role in maintaining operational stability, compliance requirements and protecting corporate assets – financial and digital.
Objectives
After completing this seminar, participants will be able to:
- Identify physical security controls and the relationship between physical and IT security.
- Comprehend security architecture, the OSI Model and network issues related to cybersecurity.
- Grasp the basics of encryption as a proactive means of securing sensitive digital assets.
- Value the significance and role of firewalls, DMZs, and infrastructure hardening in establishing strong cybersecurity programs.
- Evaluate computer security incident management policies, procedures and programs within the organization.
Course Outline
Need more information?
If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.
Request a Consultation Today
We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.
BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.