CCSS – Certified Cybersecurity Specialist
The Certified Cyber-Security Specialist training focuses on creating information security individuals who are trained in protecting, detecting and responding to threats on the network.
Information security individuals are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This training will prepare students with the fundamental
understanding of the true construct of data transfer, network technologies, software technologies so that they understand how networks operate, understand what software automating is and how to analyse the subject material.
Audience Profile
- Anyone starting a career in Information Security / Cyber-Security.
- IT professionals wanting to transition their career into Cyber-Security.
- Anyone needing a robust introduction to Cyber-Security.
- Anyone planning to work in a position that requires Cyber-Security knowledge.
- Anyone with Information Security / Cyber-Security responsibilities.
- Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge.
- Professionals familiar with basic IT and Information Security concepts and who need to round out their knowledge.
Participant Prerequisites
This training does not impose any prerequisites, however, we recommend that candidates have at least 1 year of IT administration experience.
Course Objectives
Upon completion of this course, you will be able to:
- Analyze and establish security requirements for your systems/networks.
- Defend systems against unauthorized access, modification and/or destruction.
- Configure and support security tools such as firewalls, anti-virus software, patch management systems, etc.
- Define access privileges, control structures and resources.
- Perform vulnerability testing, risk analyses and security assessments.
- Identify abnormalities and report violations.
- Oversee and monitor routine security administration.
- Develop and update business continuity and disaster recovery protocols.
Course Outline
The following items describe the outline of the course:
Day 1: Cyber-Security Essentials
- Cyber-Security: The New Frontier
- Cyber-Security & Cybercrime
- Cyber-Security Management
- Introduction to Cyber Terrorism
- Internet Radicalization
- Terrorist Use of the Internet
- Cyber Terrorism Framework
- Case Studies
Day 2: Understanding Current Threats Landscape
- CIS Top 20 Critical Controls
- Cyber Range
- Next Gen-Firewalls
New Age Threats
- Viruses & Worms
- Malware
- Zero Day Attacks
- Vulnerability Exploits
- Phishing / Social Engineering
- Cyber Espionage / Data Theft
Day 3: Reconnaissance
- Port Scan
- Web-Based Recon & Information Gathering
- Command Line Query
Vulnerability Management
- Host Scanning
- Web Application Scanning
- CVE
- Defending Against CVE Vulnerability Attacks
Day 4: Monitoring & Defending Against Advanced Attacks
- Splunk – A SIEM Monitoring Tool
- Defending Against IP Layer DDOS Attacks
- Defending Against Transport Layer DDOS Attacks
- Defending Against Application Layer DDOS Attacks
- Defending Against Botnet & C&C
Advanced Security Operations
- Malware Blocking
- Data Leak Prevention (DLP) / Data Filtering
- File Blocking
- URL Filtering
- Evasion Tactics
Day 5: Introduction to Security Incident & Incident Handling
- Security Incident, Processes & Framework
- Incident Handling
- Security Incident Priority
- Handling Intrusion Incident
- Handling Malware Incident
- Handling Phishing Incident
- Handling Spam Incident
Log Analysis
- Introduction to Log Analysis
- Log Management
- Log Visualization
- Log Analysis
- Hands-On
Course Materials
The following materials are included as part of the course:
- iTrain Asia official digital curriculum
Exam Format
Pass the 2-hour exam consisting of 50 Online Multiple Choice Questions with the score of 70% to earn this certification.