Advanced Cyber Security - An Application Approach

 

TCS iON Industry Honour Certification

Course Syllabus

The course syllabus will be delivered through a combination of eLearning resources, digital lectures, community based digital classrooms as applicable.

1
Application Security
  • Importance of application security
  • Open Web Application Security Project (OWASP) top 10 web application vulnerabilities
  • Secure Software Development Life Cycle (SSDLC)
2
Data and Endpoint Security
  • Data security, data security controls
  • Endpoint security, host/endpoint security
3
Identity and Access Management (IAM)
  • Authorization, authentication
  • Access control, access control models
  • Privilege levels, IAM lifecycle, identity and access management process and activities
4
Phases of a Cyber Attack
  • Reconnaissance: adversary identifies and selects a target
  • Weaponize: adversary packages an exploit into a payload designed to execute on the targeted computer/network
  • Deliver: adversary delivers the payload to the target system
  • Exploit: adversary code is executed on the target system
  • Install: adversary installs remote access software that provides a persistent presence within the target environment system
  • Command and control: adversary employs remote access mechanisms to establish a command and control channel with the compromised device
  • Act on objectives: adversary pursues intended objectives such as data exfiltration, lateral movement to other targets
5
Security Processes in Practice for Businesses
  • Key security business processes
  • Corporate security governance
  • IT strategy management
  • Portfolio, program, project management
  • Change management
  • Supplier (third-party management)
  • Problem management
  • Knowledge management
  • Information security management
  • Business Continuity Planning (BCP)
  • IT operations management
  • Overview of top 20 security controls
6
Information Security Standards
  • Information security standards - need
  • ISO/IEC 27000 standard series
  • ISO/IEC 27001
  • ISO/IEC 27002
  • ISO/IEC 27005
  • ISO/IEC 27006
  • SP 800 standard series
  • SP 800 -12
  • Standard of Good Practice (SoGP)
  • Control Objectives for Information and Related Technology (COBIT)
  • BSI IT-Grundschutz baseline protection
  • BSI Standard 100-1
  • BSI Standard 100-2
  • BSI Standard 100-3