Duration: 3 days – 21 hrs
Overview
The Cybersecurity Fundamentals Training Course is designed for individuals new to cybersecurity who wish to build a strong foundational knowledge of core concepts, tools, and techniques. This course covers essential topics such as cybersecurity principles, understanding the threat landscape, basics of security architecture, and key steps in incident response and recovery. Participants will gain the necessary skills to identify and understand security risks, implement fundamental security controls, and respond to security incidents.
Objectives
- Develop a foundational understanding of cybersecurity principles and best practices.
- Understand the current threat landscape and recognize common types of cyber threats.
- Learn the basics of security architecture and essential security controls.
- Gain introductory knowledge of incident response, including identification, containment, and recovery.
- Build a strong base for future learning in cybersecurity or related IT fields.
Audience
- IT Professionals new to cybersecurity
- Recent graduates and career changers interested in cybersecurity
- Business professionals looking to understand cybersecurity basics
- Junior Security Analysts
- Individuals preparing for entry-level roles in cybersecurity
Prerequisites
- Basic computer and networking knowledge is beneficial but not required.
- No formal experience in cybersecurity is necessary.
Course Content
Day 1: Cybersecurity Principles and Threat Landscape
- Introduction to Cybersecurity: Overview of cybersecurity and its importance in modern organizations.
- Core Cybersecurity Principles: Concepts of confidentiality, integrity, and availability (CIA Triad).
- Cybersecurity Roles and Responsibilities: Key roles in a cybersecurity team and responsibilities.
- Understanding the Threat Landscape: Overview of current threats, including malware, phishing, ransomware, insider threats, and social engineering.
- Cybersecurity Frameworks and Standards: Introduction to frameworks like NIST, ISO 27001, and their importance in security governance.
Day 2: Security Architecture and Fundamental Security Controls
- Introduction to Security Architecture: Basics of designing secure systems and networks.
- Network Security Basics: Overview of firewalls, VPNs, IDS/IPS, and other essential network security tools.
- Access Control and Authentication: Fundamentals of identity management, multi-factor authentication, and least privilege principles.
- Endpoint Security: Understanding the basics of endpoint protection, including antivirus software, patch management, and device hardening.
- Data Protection and Encryption: Introduction to data security concepts, including encryption, data classification, and data privacy considerations.
Day 3: Incident Response and Recovery
- Introduction to Incident Response: Overview of the incident response lifecycle and its stages.
- Preparation: Importance of planning and preparing for incidents.
- Identification and Detection: Recognizing indicators of compromise and security event alerts.
- Containment and Eradication: Steps to contain and remove threats.
- Recovery: Ensuring systems return to normal operation post-incident.
- Business Continuity and Disaster Recovery: Fundamentals of continuity planning to minimize impact during and after incidents.
- Post-Incident Activities: Conducting post-incident reviews and improving security posture based on incident learnings.
- Introduction to Security Awareness: Importance of ongoing employee training to reduce cybersecurity risks.