Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Fundamentals of Cybersecurity and Zero Trust
Security Training Overview

This is a one-day course that provides a comprehensive understanding of cybersecurity, focusing on the complexities of the cybersecurity landscape, cryptography, and the influence of users, devices, and applications on the security perimeter. The course also introduces the Zero Trust framework as a strategy to enhance cybersecurity.

This course introduces the fundamentals of cybersecurity and the principles of a Zero Trust strategy. In the first module, students are introduced to the basics of cybersecurity, gaining an understanding of the overall landscape, the role of encryption, the importance of user verification and access control, and the necessity of network and data protection. The module also emphasizes that every device can be a potential attack vector and discusses the vulnerabilities that can exist within applications.

The second module of the course focuses on the concept of a Zero Trust framework, a strategy that can help mitigate cyberattacks and safeguard an organization's assets. This part of the course covers the five core pillars of Zero Trust: identity, endpoints, applications, networks, and data. Students will learn how a Zero Trust strategy can be used to verify a user's identity, manage endpoints, control application behavior, protect networks, and secure data. By the end of this module, students will have a comprehensive understanding of the benefits of a Zero Trust strategy, its role in user identity verification and access management, endpoint protection, application behavior control, network protection, and data security.


Security Training Course Objectives

After this course a student should be able to:
  • Understand and describe the cybersecurity landscape.
  • Discuss how encryption works, and understand its broader uses in protecting your data.
  • Describe the differences between authentication and authorization.
  • Describe different network types, the network threat landscape, and how to protect them from cyberattacks.
  • Understand what a device is, how much a device knows about you, and how to reduce possible threats.
  • Understand how applications can be exploited to gain access to your data and assets.
  • Describe the benefits of using a Zero Trust strategy to protect an organization’s digital estate.

Security Training Prerequisites

  • Basic awareness of IT, devices, and applications.

Security Training Course duration

1 day

Security Training Course outline

Module 1: Fundamentals of Cybersecurity

This module provides a basic introduction to cybersecurity. It will give the student an awareness of the cybersecurity landscape, how encryption works and helps us in our day-to-day lives, and draws attention to different attack vectors that cybercriminals can exploit to gain access to your data.

Lessons
  • An overview of cybersecurity
  • Encryption and its uses in cybersecurity
  • Verify your users and control their access
  • Protect your network and data
  • Every device is an attack vector
  • Application vulnerabilities
Lab 1: Fundamentals of cybersecurity
  • Paper-based exercise, with break-out session with scenario and discussion with the group on the outcome.
After completing this module, students will be able to:
  • Describe the cybersecurity landscape.
  • Discuss how encryption works, and understand its broader uses in protecting your data.
  • Describe the differences between authentication and authorization.
  • Describe different network types, the network threat landscape, and how to protect them from cyberattacks.
  • Describe what a device is, how much a device knows about you, and how to reduce possible threats.
  • Discuss how applications can be exploited to gain access to your data and assets.
Module 2: Fundamentals of a Zero Trust strategy

This module provides an introduction to the concepts of the Zero Trust framework which when applied to your current digital estate can help reduce cyberattacks and protect your organization’s assets. It’ll cover the five core pillars of Zero Trust: identity, endpoints, applications, networks, and data.

Lessons
  • What is a Zero Trust strategy
  • Identity and manage your users with Zero Trust
  • Manage endpoints with Zero Trust
  • Control application behavior with Zero Trust
  • Protect your networks using Zero Trust
  • Secure your data with Zero Trust
Lab 1: Fundamentals of a Zero Trust strategy After completing this module, students will be able to:
  • Describe the benefits of using a Zero Trust strategy to protect an organization’s digital estate.
  • Explain how Zero Trust can help verify a user’s identity and manage their access to your data.
  • Describe different endpoints and how to use Zero Trust strategies to protect them.
  • Describe how cloud applications and the data they access can be protected using Zero Trust principles.
  • Explain how Zero Trust can help identify cyberattacks and lateral movement in your network.
  • Describe Zero Trust strategies that can help you understand your data, mitigate data loss, and protect your data.

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved