Computational Thinking

Emerging Technologies

Strategy Development

Course Outline

Lesson 1

1.0 Threat Management

1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.

  • Procedures/common tasks
  • Variables
  • Tools

Lesson 2

1.2 Given a scenario, analyze the results of a network reconnaissance.

  • Point-in-time data analysis
  • Data correlation and analytics
  • Data output
  • Tools

Lesson 3

1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.

  • Network segmentation
  • Honeypot
  • Endpoint security
  • Group policies
  • ACLs
  • Hardening
  • Network Access Control (NAC)

Lesson 5

2.0 Vulnerability Management

2.1 Given a scenario, implement an information
security vulnerability management process.

  • Identification of requirements
  • Establish scanning frequency
  • Configure tools to perform scans according to specification
  • Execute scanning
  • Generate reports
  • Remediation
  • Ongoing scanning and continuous monitoring

Lesson 7

2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.

  • Servers
  • Endpoints
  • Network infrastructure
  • Network appliances
  • Virtual infrastructure
  • Mobile devices
  • Interconnected networks
  • Virtual private networks (VPNs)
  • Industrial Control Systems (ICSs)
  • SCADA devices

Lesson 9

3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.

  • Forensics kit
  • Forensic investigation suite

Lesson 11

3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.

  • Common network-related symptoms
  • Common host-related symptoms
  • Common application-related symptoms

Lesson 13

4.0 Security Architecture and Tool Sets

4.1 Explain the relationship between frameworks, common policies, controls, and procedures.

  • Regulatory compliance
  • Frameworks
  • Policies
  • Controls
  • Procedures
  • Verifications and quality control

Lesson 15

4.4 Given a scenario, use application security best practices while
participating in the Software Development Life Cycle (SDLC).

  • Best practices during software development frameworks
  • Secure coding best practices

Lesson 4

1.4 Explain the purpose of practices used to secure a corporate environment.

  • Penetration testing
  • Reverse engineering
  •  Software/malware
  • Training and exercises
  • Risk evaluation

Lesson 6

2.2 Given a scenario, analyze the output resulting from a vulnerability scan.

  • Analyze reports from a vulnerability scan
  • Validate results and correlate other data points

Lesson 8

3.0 Cyber Incident Response

3.1 Given a scenario, distinguish threat data or behaviour to determine the impact of an incident.

  • Threat classification
  • Factors contributing to incident severity and prioritization

Lesson 10

3.3 Explain the importance of communication during the
incident response process.

  • Stakeholders
  • Purpose of communication processes
  • Role-based responsibilities

Lesson 12

3.5 Summarize the incident recovery and post-incident response process.

  • Containment techniques
  • Eradication techniques
  • Validation
  • Corrective actions
  • Incident summary report

Lesson 14

4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.

  • Security issues associated with context-based
    authentication
  • Security issues associated with identities
  • Security issues associated with identity repositories
  • Security issues associated with the federation and single sign-on
  • Exploits

Lesson 16

4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.

  • Security data analytics
  • Manual review

Lesson 17

4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies. (**The intent of this objective is NOT to test specific vendor feature sets.)

  • Preventative
  • Collective
  • Vulnerability scanning
  • Analytical
  • Exploit
  • Forensics

Anticipating the Future of Teaching and Learning

Influencing higher education teaching and learning, now and in the future.

Fun Facts

Happy Clients

Completed Projects

Office Locations

Team Members

Up Coming Courses

Our Trademarked
Process & Workflow.

Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.

All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.

Project Research

Professional development

Resources

Up to date with current issues

Expertise

Global panel of leaders

Development

Adaptive learning 

Study With Us

 The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.

[formidable id=2]