Training Introduction:
The Foundation training is aimed at IT professionals. The goal is to equip them with a baseline level of expertise
and knowledge of cyber security such that they can minimize risks as part of their day-to-day work. Laying the foundations of information security and gaining a broad understanding of why it is important. Understand what
constitutes an incident and how to escalate it appropriately. Aware of the role of logging and disasters, backups, redundancy, etc.
Security Overview :
What does security mean to you?
Technology, people and processes CIA triad IT &OT Cyber controls.
Cybersecurity Governance:
Introduction to holistic risk management Security frameworks. Ensuring compliance & security data Risk assessment and analysis Threat modelling basics
Incident Detection and Escalation:
- Introduction to incidents
- Types of incidents
- Anatomy of an attack
- Security operations
Business Continuity Planning:
- Business continuity
- Disaster recovery
- Protection mechanisms
Fundamentals of networking and sysadmin endpoint protection for users. Application and software fundamentals and understanding the implications of what has been learned so far in a cloud environment. Also miscellaneous security principles including cryptographic systems, the importance of IAM and physical security, including buildings
Network Security:
- Introduction to networks
- Data security
- Network security
- Ancillary networks
- Network design workshop
Endpoint Security
- Protection of data
- User security
- Why Endpoint Security Matters
- Administrative Security
Application Security:
- Introduction to Applications
- Securing Applications
- SDLC
- Gold builds & server hardening
Cloud Security:
- Cloud architecting introduction
- Choosing the right vendor
Application and software fundamentals and understanding the implications of what has been learned so far in a cloud
environment. Also miscellaneous security principles including cryptographic systems, the importance of IAM
and physical security, including buildings.
Identity and Access Management
- IAAA
- Authentication mechanisms
- Typical attacks
- IAM lifecycles
DevSecOps:
- Introduction to DevOps and basic
- terminology
- Achieving Secure Development Lifecycle
- (SDLC)
- Achieving proactive security
- Achieving visibility and change
- management