Course Information
- 1 Jun 2024 (Sat) 1:00 PM - 6:00 PM
(Course Duration: 15 hours, 3 sessions of 5 hours each
Course Fee: HKD4,800)
Course Overview
Course Objectives
After completing this course, you will be able to:
- Discuss the foundational concepts of cybersecurity principles.
- Recognize foundational security concepts of information assurance.
- Define risk management terminology and summarize the process.
- Relate risk management to personal or professional practices.
- Classify types of security controls.
- Distinguish between policies, procedures, standards, regulations and laws.
- Demonstrate the relationship among governance elements.
- Analyze appropriate outcomes according to the canons of the ISC2 Code of Ethics when given examples.
- Practice the terminology of and review security policies.
- Explain how organizations respond to, recover from and continue to operate during unplanned disruptions.
- Recall the terms and components of incident response.
- Summarize the components of a business continuity plan.
- Identify the components of disaster recovery.
- Practice the terminology and review concepts of business continuity, disaster recovery and incident response.
- Select access controls that are appropriate in a given scenario.
- Relate access control concepts and processes to given scenarios.
- Compare various physical access controls.
- Describe logical access controls.
- Practice the terminology and review concepts of access controls.
- Explain the concepts of network security.
- Recognize common networking terms and models.
- Identify common protocols and ports and their secure counterparts.
- Identify types of network (cyber) threats and attacks.
- Discuss common tools used to identify and prevent threats.
- Identify common data center terminology.
- Recognize common cloud service terminology.
- Identify secure network design terminology.
- Practice the terminology and review concepts of network security.
- Explain concepts of security operations.
- Discuss data handling best practices.
- Identify key concepts of logging and monitoring.
- Summarize the different types of encryption and their common uses.
- Describe the concepts of configuration management.
- Explain the application of common security policies.
- Discuss the importance of security awareness training.
- Practice the terminology and review concepts of network operations.
What You’ll Learn
Course Outline
1. Security Principles
Module 1: Understand the Security Concepts of Information Assurance
Module 2: Understand the Risk Management Process
Module 3: Understand Security Controls
Module 4: Understand Governance Elements and Processes
Module 5: Understand ISC2 Code of Ethics
2: Incident Response, Business Continuity and Disaster Recovery Concepts
Module 1: Understand Incident Response
Module 2: Understand Business Continuity (BC)
Module 3: Understand Disaster Recovery (DR)
3: Access Control Concepts
Module 1: Understand Access Control Concepts
Module 2: Understand Physical Access Controls
Module 3: Understand Logical Access Controls
4: Network Security
Module 1: Understand Computer Networking
Module 2: Understand Network (Cyber) Threats and Attacks
Module 3: Understand Network Security Infrastructure
5: Security Operations
Module 1: Understand Data Security
Module 2: Understand System Hardening
Module 3: Understand Best Practice Security Policies
Module 4: Understand Security Awareness Training