The Cybersecurity Infrastructure Expert (CSIE)® course is designed to leverage engineering in cybersecurity to address the risks associated with the application and data. The CSIE® course covers the security consideration for the Application Ecosystem® and its seven (7) layers to adequately secure the application.
Description
Who Should Take This Course?
Cybersecurity Specialists Cybersecurity Supervisors Cybersecurity Consultants What You Will Learn
Advanced engineering and design principles Cybersecurity architecture Application reliability and security engineering Operating systems and virtualization security Hash & authentication and symmetric key ciphers Public key cryptographic infrastructure Data encryption and network security Latest cybersecurity engineering best practices Syllabus
Introduction And Overview The outset of Cybersecurity Physical Security Threats Cybercrime: Leading Business Risk Globally Definition of Cybersecurity Cybersecurity Principles Principle 1 & its key Activities Principle 2 & its key Activities Principle 3 & its key Activities Principle 4 & its key Activities Cybersecurity Dimensions: Attack & Defense Security Threat to Networks Layered Security & Configuration of Perimeter Intrusion Detection & Penetration System Cybersecurity Risk & Consequences Cybersecurity Trends Understanding the threat landscape Common Threat Agents and Vulnerabilities Attributes of Cyber Attack Understanding the attributes of an Attack Malware & Types of attack Obfuscation and Mutations in Malware Network Access Control & Wireless Network Security An Overview of Network Access Control (NAC) The Network Access Control/Network Access Protection (NAC/NAP) Client/Agent Authentication and Authorization ISO 27001 For Information Security Weaknesses of Existing Cybersecurity Standards Weaknesses of existing standards Why IDCA is critical to filling the gaps Cybersecurity in Cloud Asset Management Pipeline Protecting data in the cloud Cybersecurity for IoT and Edge/or 5G Computing IoT Security Challenges & Landscape Why IoT Security devices are targeted Evolution of IT Computing Models Advantages of Edge Computing OWASP (Open Web Application Security Project) Top 10 Internet of Things Cybersecurity Architecture History & Overview Five Principles for Design of Cybersecurity Systems Before Designing a system, the Context must be Established Make it very Difficult for Attackers to Compromise your AE The Design Must Make AE Downtime Very Difficult to Occur Being Able to Detect Attacks Reduce the Impact Should an Attack Occur Application Security Architecture The Application Ecosystem TOGAF Security Architecture Phases SABSA Secure Application Development Application Security Architecture Governance Application Architecture Security Checklist Operating Systems & Virtualization Operating System Role and its Security Design Considerations Symmetric Key Ciphers & Wireless LAN Security The Feistel Function in a DES Operation AES Encryption and why it was Developed Security Challenges with AES Wi-Fi Protected Setup (WPS) Hash & Authentication Hash Message Authentication Code (HMAC) Key Derivation Function (KDF) & Pseudorandom Function (PRF) Authentication Based Password Malware Password Cracking Technique Unix Encrypted Password System Automated Password Generator One-Time Password (OTP) & Token SecurID Simple Authentication & Security (SASL) HMAC-Based One-Time Password (HOTP) Cryptographic Token Initialization Data Encryption The Need for Data Encryption Mathematical Introduction to Cryptography Public Key Cryptographic Infrastructure and Certificates The Need for Data Encryption Mathematical Introduction to Cryptography Data Protection: Using Transport Layer Security Deploying TLS for Web Servers TLS Secure Configuration Recommended Protecting Mail Servers with TLS Choosing Certificate Authority TLS Recommended Cryptographic Profiles Transport Layer Security v1.3 TLS 1.2 vs TLS1.3 – How they differ Removed Algorithms and Ciphers Faster and Refined Handshake Simplified Ciphers Suites Troubleshooting Common Errors Virtual Private Networks for Network Layer Security Network Security Overview Internet Protocol Security (IPSec) The Encapsulating Security Protocol (ESP) The Authentication Header The internet Key Exchange (IKE) Hardware Security Hardware Design Process Brief Overview Hardware Security Measurement IoT Platforms Security Evaluation Standard Secure Element and Smartcard Web & Mobile Security OWASP Top 10 Mobile Security Risk unpacked