Certified Cyber-Security Specialist - iTrain (M) Sdn Bhd

Certified Cyber-Security Specialist

5-Day Instructor-Led Course | HRDF Claimable!

Certified Cyber-Security Specialist Course Overview

The Certified Cyber-Security Specialist training focuses on creating information security individuals who are trained in protecting, detecting and responding to threats on the network.

Information security individuals are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This training will prepare students with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that they understand how networks operate, understand what software automating is and how to analyse the subject material.

In addition, network defense fundamentals, application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help information security individuals design greater network security policies and successful incident response plans.

Learning Outcomes:

Upon completion of this course, you will be able to:

  • Analyze and establish security requirements for your systems/networks.
  • Defend systems against unauthorized access, modification and/or destruction.
  • Configure and support security tools such as firewalls, anti-virus software, patch management systems, etc.
  • Define access privileges, control structures and resources.
  • Perform vulnerability testing, risk analyses and security assessments.
  • Identify abnormalities and report violations.
  • Oversee and monitor routine security administration.
  • Develop and update business continuity and disaster recovery protocols.

Who Should Attend:

  • Anyone starting a career in Information Security / Cyber-Security.
  • IT professionals wanting to transition their career into Cyber-Security.
  • Anyone needing a robust introduction to Cyber-Security.
  • Anyone planning to work in a position that requires Cyber-Security knowledge.
  • Anyone with Information Security / Cyber-Security responsibilities.
  • Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge.
  • Professionals familiar with basic IT and Information Security concepts and who need to round out their knowledge.

Prerequisites:

This training does not impose any prerequisites, however, we recommend that candidates have at least 1 year of IT administration experience.

 

Course Outline

WHAT YOU’LL LEARN: DAILY SCHEDULE

Day 1

  • Cyber-Security: The New Frontier
  • Cyber-Security & Cybercrime
  • Cyber-Security Management
  • Introduction to Cyber Terrorism
  • Internet Radicalization
  • Terrorist Use of the Internet
  • Cyber Terrorism Framework
  • Case Studies

Day 2

  • CIS Top 20 Critical Controls
  • Cyber Range
  • Next Gen-Firewalls

  • Viruses & Worms
  • Malware
  • Zero Day Attacks
  • Vulnerability Exploits
  • Phishing / Social Engineering
  • Cyber Espionage / Data Theft

Day 3

  • Port Scan
  • Web-Based Recon & Information Gathering
  • Command Line Query

  • Host Scanning
  • Web Application Scanning
  • CVE
  • Defending Against CVE Vulnerability Attacks

Day 4

  • Splunk - A SIEM Monitoring Tool
  • Defending Against IP Layer DDOS Attacks
  • Defending Against Transport Layer DDOS Attacks
  • Defending Against Application Layer DDOS Attacks
  • Defending Against Botnet & C&C

  • Malware Blocking
  • Data Leak Prevention (DLP) / Data Filtering
  • File Blocking
  • URL Filtering
  • Evasion Tactics

Day 5

  • Security Incident, Processes & Framework
  • Incident Handling
  • Security Incident Priority
  • Handling Intrusion Incident
  • Handling Malware Incident
  • Handling Phishing Incident
  • Handling Spam Incident

  • Introduction to Log Analysis
  • Log Management
  • Log Visualization
  • Log Analysis
  • Hands-On

FAQ

YOUR QUESTIONS, ANSWERED.

You bet it is! Our Certification Body for this course is iTrain Asia Pte Ltd, the region’s top Certifications Tech Provider headquartered in Singapore, with branch offices in Malaysia and Indonesia.

Upon completion of this course, you will be able to:

● Analyze and establish security requirements for your systems/networks.
● Defend systems against unauthorized access, modification and/or destruction.
● Configure and support security tools such as firewalls, anti-virus software, patch management systems, etc.
● Define access privileges, control structures and resources.
● Perform vulnerability testing, risk analyses and security assessments.
● Identify abnormalities and report violations.
● Oversee and monitor routine security administration.
● Develop and update business continuity and disaster recovery protocols.

This is a 5-day course at an instructor-led training centre. The CCSS Certification Exam Duration is 2 Hours, consisting of 50 Multiple Choice Questions, with a Passing Score of 70%. You will receive a professional CCSS Certification upon Passing the Exam.

The course is designed for:

● Anyone starting a career in Information Security / Cyber-Security.
● IT professionals wanting to transition their career into Cyber-Security.
● Anyone needing a robust introduction to Cyber-Security.
● Anyone planning to work in a position that requires Cyber-Security knowledge.
● Anyone with Information Security / Cyber-Security responsibilities.
● Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge.
● Professionals familiar with basic IT and Information Security concepts and who need to round out their knowledge.

This training does not impose any prerequisites, however, we recommend that candidates have at least 1 year of IT administration experience.

Computers are provided for iTrain students. However participants can also use their own computers as long as it’s installed with the necessary applications.