Program content
This program will offer you extensive exposure to various Cybersecurity approaches, utilizing the latest tools and platforms available in the market, providing a significant learning experience.
NEW BUSINESS RISKS IN VUCA ENVIRONMENTS
a) Introduction to Cybersecurity
b) Current state of cybersecurity: cyber-terrorism, cyber-wars and APTs.Â
c) Terms and definitions in cybersecurity
CYBERSECURITY STRATEGY
a. Security GovernanceÂ
- Departmental structure
- Decision-making bodies
- Cybersecurity reporting
b. Cybersecurity strategy and models
- Cybersecurity standards and frameworks.
- Cyber Strategy Framework: NIST
- Security policies and standards. Regulatory models and normative bodies.
c. Regulatory compliance associated with cybersecurity.
- Critical Infrastructure Protection Law / NIS2.
- GDPR
- PCI/SWIFTÂ
d. Information security management system
- Development Regulatory Body
- Design an ISMS
- Risk Analysis
- Risk Management
SECURITY CONTROLS AND MEASURES
a. Identity protection
- Identity Management
- MFA
- Biometry
- Digital Certificate
- Secure coding AWASP
b. Security in communications and networks
- Secure network architecture
- Secure protocols
- Configuration of firewalls
- Encryption of information
- Network access control
c. Cloud Security
- Policies
- Kubernetes
- Microservices
- Secure configuration and audit of System
d. Information protection and data governance.
- Classification of information
- Cryptography
- Data loss prevention
- Information rights management
- Mobile Device Security
SECURITY VIGILANCE
a) Security Operation Center
- What is a SOC?
- Services to be provided by a SOC
- "Threat Intelligence Analysis
- "Threat hunting".
- Event monitoring and correlation
- SOC maturity models
- SIEM/EDR Management
b. Technical security analysis
- Initiation to hacking
- Methodologies of technical audits
- Attack tools and techniques
- Perform vulnerability scans
- Pentesting
SECURITY RESILIENCE
a. Security Incident Response -Basics
b. Security Crisis Management
c. Malware analysis
d. Forensic analysis