Cyber Security

Foundation - CSFPC™


Become a certified CertiProf Cybersecurity
Professional today


Get in Touch With Us
Cyber Security
Foundation - CSFPC™

Become a certified CertiProf
Cybersecurity Professional
today
Become a certified CertiProf Cybersecurity Professional today

Understand the techniques for protecting personal information, including communications, applications, and inferences from databases and data processing. Understand other systems supporting online rights touching on censorship and circumvention, covertness, electronic elections, and privacy in payment and identity systems.
Key Learning Objectives

  • Understand the importance of Cybersecurity
  • Understand the key concepts related to Cyber Security
  • Understand the concepts related to human, organizational, and regulatory aspects
  • Understand the concepts related to Attacks and Defenses
Program Modules
Module 0 - NIST - Cybersecurity for Small Business

Module 0 - NIST - Cybersecurity for Small Business

  1. Cybersecurity for Small Business
  2. Cybersecurity for Small Business
  3. Cybersecurity Objectives
  4. Confidentiality
  5. Integrity
  6. Availability
  7. Small Business, Big Impact
  8. Cybersecurity Basics Resources
  9. Cybersecurity Threats
  10. Phishing Attacks
  11. Ransomware
  12. Hacking
  13. Imposter Scams
  14. Environmental Threats
  15. Elements of Risk
  16. Impact of an Incident
  17. What are you protecting?
    i.Identify Your Business Assets
    ii.Identify the Values of the Assets
    iii.Document the Impact to your Business of Loss/Damage to the Assets
    iv.Identify Likelihood of Loss or Damage to the Asset
    v.Identify Priorities and Potential Solutions
  18. NIST Cybersecurity Framework
Cybersecurity Framework Functions

Cybersecurity Framework Functions

  1. Learning Objectives
  2. The Framework Core
  3. An Excerpt from the Framework Core
  4. Identify
  5. Sample Identify Activities
  6. Protect
  7. Sample Protect Activities
  8. Detect
  9. Sample Detect Activities
  10. Respond
  11. Sample Respond Activities
  12. Recover
  13. Sample Recover Activities
  14. Framework
  15. Everyday Tips
  16. Resources
Module 1: CyBOK – Cyber Security Fundamentals

Module 1: CyBOK – Cyber Security Fundamentals

  1. Cyber Security Definition
  2. CyBOK Knowledge Areas
  3. Deploying CyBOK Knowledge To Address Security Issues
  4. Functions Within A Security Management System
  5. Principles
  6. Crosscutting Themes
  7. Cyberspace
Module 2: Risk Management & Governance

Module 2: Risk Management & Governance

  1. Topics Covered in this Lesson
  2. What is Risk?
  3. Why is risk assessment and management important?
  4. What is cyber risk assessment and management?
  5. Risk Governance
  6. The Human Factor and Risk Communication
  7. Security Culture and Awareness
  8. Enacting Security Policy
  9. Risk Assessment and Management Principles
  10. Element of Risk
  11. Risk Assessment and Management Methods
  12. Component-driven Cyber Risk Management Frameworks
  13. System-driven Cyber Risk Management Methods
  14. Risk Assessment and Management In Cyber-physical Systems and Operational Technology
  15. Security Metrics
  16. What constitutes Good and Bad metrics?
  17. Business Continuity
  18. ISO/IEC 27035-1:2016
  19. NCSC- ISO/IEC 27035
  20. Conclusion
Module 3: Law and Regulation

Module 3: Law and Regulation

  1. Introduction
  2. Challenges
  3. Response
  4. Out of Scope
  5. Introductory Principles of Law and Legal Research
  6. “To Prove” Something
  7. “Standards” of Proofs
  8. Applying Law to Cyberspace and Information Technologies
  9. Distinguishing Criminal and Civil Law
  10. Jurisdiction
  11. A Taxonomy of Jurisdiction
  12. Prescriptive Jurisdiction
  13. Enforcement Jurisdiction
  14. The Data Sovereignty Problem
  15. Privacy Laws in General and Electronic Interception
  16. State Interception (Lawful Access)
  17. Non-state Interception
  18. Data Protection
  19. The “Players”
  20. What is regulated?
  21. “Personal Data” vs “PII”
  22. Data Protection Highlights
  23. Computer Crime
  24. Crimes Against Information Systems
  25. Recurring Challenges
  26. Contract
  27. Contract as Means to Encourage Security Behaviours
  28. Limits of Influence
  29. Relative Influence of Contract Over Security Behaviours
  30. Breach of Contract & Remedies
  31. Tort
  32. Tort Examples
  33. Negligence (Fault Based Liability)
  34. Product Liability (Strict Liability)
  35. Quantum of Loss (QQ)
  36. Attributing and Apportioning Liability
  37. Intellectual Property
  38. Reverse Engineering
  39. Internet Intermediaries Shields from Liability and Take-down Procedures
  40. Dematerialization of Documents and Electronic Trust Services
  41. Legal Challenges Emerge
  42. Other Regulatory Matters
  43. Public International Law
  44. State Attribution
  45. Limiting Operations
  46. Ethics
  47. Codes of Conduct
  48. Vulnerability Testing and Disclosure
  49. Legal Risk Management
Module 4: Human Factors

Module 4: Human Factors

  1. Introduction
  2. Human Factors
  3. Security Has to be Usable
  4. Fitting the Task to the Human
  5. Human Capabilities and Limitations
  6. STM and One-time password (OTPs)
  7. General Human Capabilities and Limitations
  8. CAPTCHA
  9. Goals and Tasks
  10. Capabilities and Limitations of the Device
  11. Human Error
  12. Latent Design Conditions
  13. Awareness and Education
  14. What usability issues do developers face?
  15. Developers are not the Enemy! The Need for Usable Security APIs
  16. Usability Smells: An Analysis of Developers’ Struggle With Crypto Libraries
Module 5: Privacy & Online Rights

Module 5: Privacy & Online Rights

  1. Introduction
  2. Overview
  3. Privacy as Confidentiality
  4. What is the problem?
  5. What is privacy?
  6. Defining Privacy
  7. Privacy as…
  8. Privacy as Transparency
  9. Privacy as Control
  10. Limits of Control and Transparency
  11. Privacy as Confidentiality
  12. Privacy Threat Landscape
  13. Formal Approach to Inference Control
  14. Privacy as Confidentiality
  15. Data Confidentiality
  16. Metadata Confidentiality
  17. Privacy as Control
  18. Privacy as Transparency
  19. Privacy Technologies
  20. Privacy Engineering
  21. Privacy Evaluation
  22. Conclusions
Module 6: Malware & Attack Technologies

Module 6: Malware & Attack Technologies

  1. Introduction
  2. Malware
  3. A Taxonomy of Malware
  4. Malware Taxonomy: Dimensions
  5. Taxonomy: Examples
  6. Potentially Unwanted Programs (PUPs)
  7. Malicious Activities by Malware
  8. The Cyber Kill Chain
  9. The Cyber Kill Chain Model
  10. Underground Eco-system
  11. Action Objectives
  12. Malware Analysis
  13. Acquiring Malware Data
  14. Static Analysis
  15. Other Analysis Techniques
  16. Analysis Environments
  17. Common Environments
  18. Safety and Live-Environments
  19. Anti-Analysis and Evasion Techniques
  20. Malware Detection
  21. Evasion and Countermeasures
  22. Detection of Malware Attacks
  23. ML-based Security Analytics
  24. ML-based Malware Detection
  25. Evasion of ML-based Malware Detection
  26. Concept Drift
  27. Malware Response
  28. Disrupt Malware Operations
  29. Attribution
  30. Evasion and Countermeasures
  31. Conclusion
Module 7: Adversarial Behaviour

Module 7: Adversarial Behaviour

  1. Introduction
  2. A Characterization of Adversaries
  3. Interpersonal Offenders
  4. Cyber-enabled Organized Criminals
  5. Cyber-dependent Organized Criminals
  6. Hacktivists
  7. State Actors
  8. The Elements of a Malicious Operation
  9. Specialized Services
  10. Human Services
  11. Payment Methods
  12. Models to Understand Malicious Operations
  13. Attack Trees : Example of an Attack
  14. Cyber Kill Chain
  15. Environmental Criminology
  16. Attack Attribution
Module 8: Security Operations & Incident Management

Module 8: Security Operations & Incident Management

  1. Introduction
  2. What is it about?
  3. Timeline and Scope
  4. Overall MAPE-K loop
  5. Components of MAPE-K Monitor-Analyse-Plan-Execute
  6. Deployment of SOIM Technologies
  7. Architectural Principles Typical Architecture
  8. Intrusion Detection and Prevention Systems
  9. MONITOR: Data sources
  10. Network Data Sources: Possible Detections
  11. Application Data Sources
  12. System Data Sources
  13. Syslog
  14. Frequent Data Sources Issues
  15. Analysis of Traces
  16. From Event to Incident
  17. Misuse Detection
  18. Anomaly Detection
  19. General Intrusion Detection Issues
  20. Typical Architecture Security Information and Event Managementures
  21. Data Collection in SIEMs
  22. Alert Correlation
  23. Mitigations and Countermeasures Tools and Techniques
  24. Intelligence and Analytics
  25. Incident Management Lifecycle
Module 9: Certification Exam

Module 9: Certification Exam

  1. Badge
  2. Exam Conditions
Our Training Methodology
Program Key Highlights

online-learning-2
48 hours of Remote Online Learning
learning-hours
Additional Coaching Hours
hands-on
Live Hands-on Projects
certification
Certified by International Body
mentor
Mentorship with Industry Experts
industry
Designed for Beginners & Professionals

Get Professionally Certified

Upon successfully completing this program, participants will be awarded the Agile HR Certified Professional Certificate by Certiprof.
This award is a validation to the efforts taken to master the domain expertise that will set you apart from your competition.
Be a part of the global network of professionals and join the community across sectors.

Memberships
 
 



READY TO KICKSTART YOUR CAREER?
Please fill in the form and a Program Advisor will reach out to you. You can also reach out to us at info@thulija.com or +60123661502
Contact us on Whatsapp for more enquiries