Computational Thinking
Emerging Technologies
Strategy Development
Course Outline
Lesson 1
1.0 Threat Management
1.1 Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes.
- Procedures/common tasks
- Variables
- Tools
Lesson 2
1.2 Given a scenario, analyze the results of a network reconnaissance.
- Point-in-time data analysis
- Data correlation and analytics
- Data output
- Tools
Lesson 3
1.3 Given a network-based threat, implement or recommend the appropriate response and countermeasure.
- Network segmentation
- Honeypot
- Endpoint security
- Group policies
- ACLs
- Hardening
- Network Access Control (NAC)
Lesson 5
2.0 Vulnerability Management
2.1 Given a scenario, implement an information
security vulnerability management process.
- Identification of requirements
- Establish scanning frequency
- Configure tools to perform scans according to specification
- Execute scanning
- Generate reports
- Remediation
- Ongoing scanning and continuous monitoring
Lesson 7
2.3 Compare and contrast common vulnerabilities found in the following targets within an organization.
- Servers
- Endpoints
- Network infrastructure
- Network appliances
- Virtual infrastructure
- Mobile devices
- Interconnected networks
- Virtual private networks (VPNs)
- Industrial Control Systems (ICSs)
- SCADA devices
Lesson 9
3.2 Given a scenario, prepare a toolkit and use appropriate forensics tools during an investigation.
- Forensics kit
- Forensic investigation suite
Lesson 11
3.4 Given a scenario, analyze common symptoms to select the best course of action to support incident response.
- Common network-related symptoms
- Common host-related symptoms
- Common application-related symptoms
Lesson 13
4.0 Security Architecture and Tool Sets
4.1 Explain the relationship between frameworks, common policies, controls, and procedures.
- Regulatory compliance
- Frameworks
- Policies
- Controls
- Procedures
- Verifications and quality control
Lesson 15
4.4 Given a scenario, use application security best practices while
participating in the Software Development Life Cycle (SDLC).
- Best practices during software development frameworks
- Secure coding best practices
Lesson 4
1.4 Explain the purpose of practices used to secure a corporate environment.
- Penetration testing
- Reverse engineering
- Software/malware
- Training and exercises
- Risk evaluation
Lesson 6
2.2 Given a scenario, analyze the output resulting from a vulnerability scan.
- Analyze reports from a vulnerability scan
- Validate results and correlate other data points
Lesson 8
3.0 Cyber Incident Response
3.1 Given a scenario, distinguish threat data or behaviour to determine the impact of an incident.
- Threat classification
- Factors contributing to incident severity and prioritization
Lesson 10
3.3 Explain the importance of communication during the
incident response process.
- Stakeholders
- Purpose of communication processes
- Role-based responsibilities
Lesson 12
3.5 Summarize the incident recovery and post-incident response process.
- Containment techniques
- Eradication techniques
- Validation
- Corrective actions
- Incident summary report
Lesson 14
4.2 Given a scenario, use data to recommend remediation of security issues related to identity and access management.
- Security issues associated with context-based
authentication - Security issues associated with identities
- Security issues associated with identity repositories
- Security issues associated with the federation and single sign-on
- Exploits
Lesson 16
4.3 Given a scenario, review security architecture and make recommendations to implement compensating controls.
- Security data analytics
- Manual review
Lesson 17
4.5 Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies. (**The intent of this objective is NOT to test specific vendor feature sets.)
- Preventative
- Collective
- Vulnerability scanning
- Analytical
- Exploit
- Forensics
Anticipating the Future of Teaching and Learning
Influencing higher education teaching and learning, now and in the future.


Fun Facts
Happy Clients
Completed Projects
Office Locations
Team Members
Up Coming Courses
Our Trademarked
Process & Workflow.
Training and Capacity Building is an integral part in
modern education. It strongly exists to expand their
knowledge and expertise.
All these years, we have been successfully imparting knowledge to our clients in a single trust to make them more independent, resourceful and capable to attempt any issues.
Project Research
Professional development
Resources
Up to date with current issues
Expertise
Global panel of leaders
Development
Adaptive learning
Study With Us
The importance of professional development should not be underestimated – it is a career-long obligation for practicing professionals.