Advanced Cyber Security - An Application ApproachBuild your career in Cyber Security
Course Syllabus
The course syllabus will be delivered through a combination of eLearning resources, digital lectures, community based digital classrooms as applicable.
-
1
Application Security
- Importance of application security
- Open Web Application Security Project (OWASP) top 10 web application vulnerabilities
- Secure Software Development Life Cycle (SSDLC)
2
Data and Endpoint Security
- Data security, data security controls
- Endpoint security, host/endpoint security
3
Identity and Access Management (IAM)
- Authorization, authentication
- Access control, access control models
- Privilege levels, IAM lifecycle, identity and access management process and activities
4
Phases of a Cyber Attack
- Reconnaissance: adversary identifies and selects a target
- Weaponize: adversary packages an exploit into a payload designed to execute on the targeted computer/network
- Deliver: adversary delivers the payload to the target system
- Exploit: adversary code is executed on the target system
- Install: adversary installs remote access software that provides a persistent presence within the target environment system
- Command and control: adversary employs remote access mechanisms to establish a command and control channel with the compromised device
- Act on objectives: adversary pursues intended objectives such as data exfiltration, lateral movement to other targets
5
Security Processes in Practice for Businesses
- Key security business processes
- Corporate security governance
- IT strategy management
- Portfolio, program, project management
- Change management
- Supplier (third-party management)
- Problem management
- Knowledge management
- Information security management
- Business Continuity Planning (BCP)
- IT operations management
- Overview of top 20 security controls
6
Information Security Standards
- Information security standards - need
- ISO/IEC 27000 standard series
- ISO/IEC 27001
- ISO/IEC 27002
- ISO/IEC 27005
- ISO/IEC 27006
- SP 800 standard series
- SP 800 -12
- Standard of Good Practice (SoGP)
- Control Objectives for Information and Related Technology (COBIT)
- BSI IT-Grundschutz baseline protection
- BSI Standard 100-1
- BSI Standard 100-2
- BSI Standard 100-3