Foundation Certificate in Cyber Security
Future Connect Group provides training in " Foundation Certificate in Cyber Security " on various locations in London, Dubai, Abu Dhabi, Riyadh, Dammam, Jeddah, Bahrain, Qatar, Kuwait, Oman, Rome, and Islamabad.
Computing Foundation, Data Storage and Memory
Computer system components, operating systems (Windows, Linux & Mac), different types of storage, file systems (FAT & NTFS), memory management.
OSI Protocol Stack
Switched networks, packet switching vs circuit switching, packet routing delivery, routing, internetworking standards, OSI model, and 7 layers.
TCP/IP protocol suite, types of addresses, physical address, logical address, IPv4, IPv6, port address, specific address, network access control,
Network fundamentals, network types (advantages & disadvantages), WAN vs LAN, DHCP
How does data travel across the internet? End to end examples for web browsing, send emails, using applications – explaining internet architecture, routing, DNS.
Secure planning, policies, and mechanisms, Active Directory structure, introducing Group Policy (containers, templates, GPO), security and network layers, IPSEC, SSL / TLS (flaws and comparisons) SSH, Firewalls (packet filtering, state-full inspection), application gateways, ACL’s.
VoIP, wireless LAN, Network Analysis and Sniffing, Wireshark.
Virtualisation & Cloud Technologies
Virtualization definitions, virtualization models, terminologies, virtual models, virtual platforms, what is cloud computing, cloud essentials, cloud service models, security & privacy in the cloud, multi-tenancy issues, infrastructure vs data security, privacy concerns.
Security Information Event Management (SIEM) processes and architecture, SIEM features, user activity monitoring, real-time event correlation, log retention, file integrity monitoring, security auditing & automation auditing, what to audit, implementation guidelines, what to collect, Windows Event Log, UNIX Syslog, logging at an application level, audit trail analysis, approaches to data analysis.
Common Methods of Attack
Cyber exploits, understanding malware, cross-site scripting, SQL Injection, DDOS, input validation, buffer-overflow, targeted attacks and advanced persistent threats (APT).
Uses of encryption technology, symmetric/asymmetric key encryption, public and private keys, weaknesses, decryption, hashing, digital signatures, PKI, certificates authorities, data at rest and in transit, SSL.
Cyber and the Legal Framework
Legislation, chain of custody, reporting, and assurance within the context of a legal framework. Inc. overview of the Data Protection Act (DPA 2018) and the EU General Data Protection Regulation (GDPR).
Internet foundations, domain name system, whois (Inc. worked example), Traceroute, Internet analysis, search engines, Tools for finding information on people and companies, username searchers, email lookups, disposable emails, passwords, internet communities and culture, deep web directories and leaking websites.
Overview – the drivers for UK Information Assurance, initiatives, and programs, risk assessment vs risk management, risk components.
Risk Management and Risk Treatment
Business context and risk management approach, risk management lifecycle, who delivers risk management – wherein the lifecycle, understanding the context, legal and regulatory. Risk Treatment – Identify the ways of treating risks, methods of gaining assurance, understanding the nature of residual risk, collecting evidence that supports decisions, risk management decisions.
Physical security – lighting, CCTV, fencing, intrusion detection, screening, destruction, UPS and generators, access and control of entry.
People, employees, contractors, customers (resource, vulnerability, threat), recruitment, screening, Social Engineering, Common People Exploits, T&C’s, in the role, change in role, termination, insider threat, supply chain challenges.
Service Assurance & Standards
Assurance perspective – including CPA, CAPS, FIPS, CE, Common Criteria, SPF. Summary of common industry standards. (Inc. OWASP, ISO27001, PCI-DSS)
Software Security Assurance
Principles for software security, (securing the weakest link, defense in depth, failing securely, least privilege, separation of privilege), IA design principles
Secure Development Process
Secure by Design, Secure Development Life Cycle (SDLC)
What is threat modeling, threat modeling processes
STRIDE: Risk Mitigation
Risk mitigation options
Security Best Practice
Reduce the attack surface, defense in depth, test security, weaknesses and vulnerabilities, secure coding, learn from mistakes
Introduction to Security Architecture
Security design architecture, enterprise design frameworks (TOGAF, ZACHMAN, SABSA), patterns (NCSC, Open Security Architecture)
Future Connect Training Institute is a part of Future Connect Group. We provide intensive practical training in various subjects and jobs specific areas. The training courses are held around the year at various locations like London, Dubai, Abu Dhabi, Riyadh, Dammam, Jeddah, Bahrain, Qatar, Kuwait, Oman, Rome, and Islamabad.