Cybersecurity Foundations

Code: 9701

5 days

List Tuition : $3,795.00 USD

Course Overview

    Download PDF 

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.

Cybersecurity professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants

  • Current cyber threats and cybersecurity site references
  • Government-mandated directives and compliance requirements
  • Cyber roles required to successfully design secure systems
  • The attack cycle perpetrated by malicious hackers
  • Enterprise policy requirements
  • Best strategies for securing the enterprise with layered defenses
  • How security zones and detailed logging augment information assurance
  • Forensic challenges and incident response planning
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Industry recommendations for maintaining secure access control
  • Standards-based cryptographic solutions for securing communications

1. The Cyber Battlefield

  • Critical Business Security
  • Worldwide Internet Growth
  • Security Fundamentals
  • Security Goals
  • Terminology Threats and Exposures
  • Exploits and Exposures
  • Hackers and Crackers
  • Attack Methods
  • Social Engineering
  • Common Attack Vectors
  • Traffic Analysis
    • Responding to Threats and Attacks
  • Documents and Procedures to Manage Risk
  • Vulnerability Scanners
  • Penetration Testing
  • The OSSTMM
  • NIST
  • Risks of Penetration Testing

2. The Structure of the Internet and TCP/IP

  • CNCI
    • Initiatives
  • Legal Compliance Standards
    • Acts
    • Federal Agency Compliance
    • Commercial Regulatory Compliance
  • Internet Leadership IANA
    • Regional Internet Registry
    • Protocols and RFCs
  • TCP/IP Model
    • Network Access Layer
    • Internet Layer
    • Host-to-Host Layer
    • Process Layer
  • Domain Name Service

3. Vulnerability Assessment and Tools

  • Vulnerabilities and Exploits
  • Vulnerability Assessment Tools
    • Application-Level Scanners
    • System-Level Scanners
    • System-Level Testing Tools
    • Open Source System-Level Scanner Tools
    • Commercial System-Level Scanner Tools
  • Advanced Attack Techniques and Tools
  • Commercial Exploit Tools
    • Free Exploit Tool: Metasploit
    • Free Exploit Tool: BeEF
  • Fuzz Testing
  • Preventing Exploits and Attacks
  • Patch Management
  • Common Vulnerabilities and Exposures
  • Alerts and Software
  • Tools
  • Vulnerability Research
  • Common Security Sites
  • Patch Management
    • Tools

4. Cyber Awareness

  • Social Engineering
    • Social Engineering Goals
    • What Makes Social Engineering Possible
    • Targets
    • Attacks
    • Phishing
    • Phishing via Email
    • Online Attacks
    • Statistical Data
    • Sources of Security Breaches
    • Preventing Social Engineering
  • Cyber Awareness: Policies and Procedures
    • Security Policy Topics
    • Social Media
    • Social Networking Sites

5. Cyber Attacks: Footprinting and Scanning

  • Footprinting
    • Gathering Information
    • Unearthing Initial Information
    • Internet Archive
    • People Search
    • Locations and Mapping
    • Job Boards
    • Financial Information
    • Google and Search Operators
  • Identifying the Target Network and Its Range
    • WHOIS Utility
    • DNS Online Search Tools
    • Traceroute
    • Footprinting Countermeasures
  • Detecting Live Systems
    • Bypassing Authentication
    • War Dialing
    • Wardriving
    • ICMP: Ping
    • Port Scanning
    • Performing TCP and UDP Scans
    • Port Numbers
  • TCP Flags
    • TCP ThreeWay Handshake
  • Port Scanning Techniques
    • TCP Full Connect Port Scan
    • TCP HalfOpen (SYN) Scanning
    • Nmap HalfOpen Scan
    • UDP Port Scan
    • Nmap Scan Types and Switches
    • Port Scanning Tools
    • OS Fingerprinting
    • Active Stack Fingerprinting
    • Passive Fingerprinting
  • Proxies and Anonymizers
  • Scanning Countermeasures

6. Cyber Attacks: Breaking and Entering

  • Password Attacks
  • Privilege Escalation
  • Maintaining Access
  • Windows Authentication
    • SysKey Encryption
    • <

TCP/IP Networking or equivalent knowledge

Request a Discounted Quote




Bring Training to You

Request schedule for this course

Request a Quote for this Class

We provide government and government contractor discounts, please request a quote

Schedule



total option: 14

06/24/2019 - 06/28/2019

Request a quote

Virtual Training

07/15/2019 - 07/19/2019

Request a quote

Ottawa, ON, Canada

07/15/2019 - 07/19/2019

Request a quote

Virtual Training

07/29/2019 - 08/02/2019

Request a quote

Dallas, TX, USA

07/29/2019 - 08/02/2019

Request a quote

Virtual Training

08/12/2019 - 08/16/2019

Request a quote

Washington, DC, USA

08/12/2019 - 08/16/2019

Request a quote

Virtual Training

08/19/2019 - 08/23/2019

Request a quote

Virtual Training

09/09/2019 - 09/13/2019

Request a quote

Virtual Training

09/16/2019 - 09/20/2019

Request a quote

Virtual Training

09/16/2019 - 09/20/2019

Request a quote

Chicago, IL, USA

09/30/2019 - 10/04/2019

Request a quote

Toronto, ON, Canada

09/30/2019 - 10/04/2019

Request a quote

Virtual Training

10/14/2019 - 10/18/2019

Request a quote

Virtual Training

10/28/2019 - 11/01/2019

Request a quote

Virtual Training

11/04/2019 - 11/08/2019

Request a quote

Virtual Training

12/02/2019 - 12/06/2019

Request a quote

Virtual Training

12/02/2019 - 12/06/2019

Request a quote

New York City, NY, USA

12/09/2019 - 12/13/2019

Request a quote

Virtual Training

12/16/2019 - 12/20/2019

Request a quote

Virtual Training

12/16/2019 - 12/20/2019

Request a quote

Boston, MA, USA

Hotel and Travel can be included on your quote.
For immediate response, you can call 1-855-515-2170 or we will provide a quote within 4 business hours. Travel must be booked 14 days before training for rate to apply.

Learn How to Become a Managed Learning Member

Request a Quote

Thank you for requesting a quote, we will be in touch shortly with a quote. If you need immediate assistance, please call 855-515-2170.

Request Other Date

Request date or location you need

Don’t see the date or location you need? Contact us and let us know, we are adding dates and locations daily.