CSX Fundamentals



  1. Cybersecurity introduction and overview
    1. Cybersecurity definition
    2. Objectives of cybersecurity
    3. Key business and technology factors
    4. Cybersecurity roles and governance
    5. Domains of cybersecurity


  2. Cybersecurity concepts
    1. Risk management terms, concepts and frameworks
    2. Common attack types and vectors
    3. General process and attributes of cyber attacks
    4. Malware
    5. Framework and guidance for policies and procedures
    6. Cybersecurity control processes


  3. Security architecture
    1. Perimeter security concepts
    2. Security architectures and frameworks
    3. The OSI model and TCP/IP communication protocol
    4. Defense in depth
    5. Firewall concepts and implementations
    6. Isolation and segmentation
    7. Intrusion detection and prevention systems
    8. Antivirus and anti-malware
    9. Encryption fundamentals, techniques and applications


  4. Security of networks, systems, applications and data
    1. Risk analysis, risk assessments and risk mitigation strategies
    2. Scanning, assessment and management of vulnerabilities
    3. Penetration testing
    4. Network management and configuration
    5. Port numbers and protocols
    6. Risk and controls for remote and wireless access
    7. System hardening and virtualization
    8. Specialized systems
    9. Command line knowledge and tools
    10. System development life cycle (SDLC)
    11. OWASP top ten application security risk
    12. Data classification process and requirements


  5. Incident response
    1. Distinctions between events and incidents
    2. Incident categories and types
    3. Security event management
    4. Key elements of incident response plans
    5. Legal requirements of investigation and evidence preservation
    6. Requirements for forensic investigations
    7. Business continuity planning and disaster recovery


  6. Security implications of the adoption of emerging technologies
    1. Trends in the current threat landscape
    2. Characteristics and targets of advanced persistent threats (APTs)
    3. Mobile device vulnerabilities, threats and risk
    4. BYOD and consumerization of IT and mobile devices
    5. Risk and benefits of cloud and digital collaboration


Per qualsiasi informazione mandare una mail con in oggetto l’argomento del quale si desidera avere notizie a