Session 26 –
Cybersecurity Fundamentals: Introduction to Cybersecurity
Session
topics:
1.1 Overview
1.2 What is Security?
1.3 Types of Security
Enrichment:
Session 27 –
Cybersecurity Fundamentals: Cybersecurity and Privacy
Session
topics:
1.4 Specialized Systems
1.5 Roles and Responsibilities
1.6 Governance, Risk Management and
Compliance
1.7 Cybersecurity Governance
1.13 Privacy
1.14 Privacy vs. Security
Session 28 – Cybersecurity
Fundamentals: Service Disruption and Cybersecurity
Session
topics:
1.8 Resilience
1.9 Business Continuity and Disaster
Recovery
1.10 Business Impact Analysis
1.11 Recovery Concepts
Session 29 –
Cybersecurity Fundamentals: Threat Landscape
Session
topics:
1.4 Specialized Systems
1.5 Roles and Responsibilities
1.6 Governance, Risk Management and
Compliance
1.7 Cybersecurity Governance
1.13 Privacy
1.14 Privacy vs. Security
Session 30 –
Cybersecurity Fundamentals: Cyberattacks
Session
topics:
2.5 Attack Attributes
2.6 Attack Process
2.7 Malware and
Attacks
Session 31 –
Cybersecurity Fundamentals: Risk Management
Session
topics:
2.8 Risk Assessment
2.9 Supply Chain
Considerations
2.10 Risk Management
Life Cycle
2.11 Managing Risk
2.12 Using the Results
of Risk Assessments
Session 32 –
Cybersecurity Fundamentals: Securing Assets
Session
topics:
3.1 Risk
Identification, Standards, Frameworks and Industry Guidance
3.3.8 Endpoint
Security
3.3.9 System Hardening
3.3.10 Logging,
Monitoring and detection
3.3.13 Data Security
Session 33 –
Cybersecurity Fundamentals: Security Architecture
Session
topics:
3.2 Architecture,
Models, and Frameworks
Session 34 –
Cybersecurity Fundamentals: Security Controls
Session
topics:
3.3 Security Controls
(3.3.1 to 3.3.6)
Session 35 –
Cybersecurity Fundamentals: Network Security
Session
topics:
3.3.7 Network Security
Session 36 –
Cybersecurity Fundamentals: Application and Cloud Security
Session
topics:
3.3.11 Application
Security
3.3.12 Cloud Security
Session 37 -
Cybersecurity Fundamentals: Software Management and Encryption
Session
topics:
3.3.14 Configuration
Management
3.3.15 Change
Management
3.3.16 Patch
Management
3.3.17 Encryption
Fundamentals, Techniques and Applications
Session 38 –
Cybersecurity Fundamentals: Introducing Security Operations
Session
topics:
4.1 Security
Operations
Session 39 - Cybersecurity Fundamentals: Testing
Technologies and Security Tools
Session
Topics:
4.2 Tool and
Technologies (Monitoring, Detection, Correlation)
4.4 Forensics
Session 40 –
Cybersecurity Fundamentals: Handling Security Incidents
Session
Topics:
4.3 Incident Handling