1) Cybersecurity architecture principles,
2) Security of networks, systems, applications and data,
3) Incident response,
4) The security implications of the adoption of emerging technologies.
1) Cybersecurity architecture principles,
2) Security of networks, systems, applications and data,
3) Incident response,
4) The security implications of the adoption of emerging technologies.
Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamental Course is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This course will also cover four key areas of cybersecurity:
Why become a cybersecurity professional? The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamental Course is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This course will also cover four key areas of cybersecurity:
• Understand basic cybersecurity concepts and definitions
• Apply cybersecurity architecture principles
• Identify components of a cybersecurity architecture
• Define network security architecture concepts including:
o topology
o protocols
o components
o principles
• Understand malware analysis concepts and methodology
• Recognize the methodologies and techniques for detecting
host-and-network-based intrusions via intrusion
detection technologies
• Identify computer network defense (CND) and
vulnerability assessment tools, including open source
tools and their capabilities
• Understand system hardening
• Apply penetration testing principles, tools, and techniques
• Define network systems management principles, models,
methods, and tools
• Understand remote access technology and systems
administration concepts
• Recognize the Unix command line
• Distinguish system and application security threats
and vulnerabilities
• Recognize system lifecycle management principles,
including software security and usability
• Understand the local specialized system requirements for
safety, performance, and reliability
• Define types of incidents (categories, responses, and timelines
for responses)
• Outline disaster recovery and business continuity planning
• Understand incident response and handling methodologies
• Understand security event correlation tools, and how different
file types can be used for atypical behavior
• Recognize investigative implications of hardware,
operating systems, and network technologies
• Be aware of the basic concepts, practices, tools, tactics,
techniques, and procedures for processing digital forensic data
• Identify network traffic analysis methods
• Recognize new and emerging information technology
and information security technologies including:
o The current threat landscape
o Mobile devices
o Cloud computing and storage
info@rhythexconsultingghana.com
No. 9 Samora Machel Road Asylum
Down, Accra – Ghana
Tel: +233 (0) 30 223 1305
info@rhythexconsulting.com
39A Sura Mogaji Street, Off Coker Road, Ilupeju, Lagos, Nigeria
Tel: +234 (0) 909008496
info@rhythexconsulting.com
Plot 624, James Agwu Onoja Street,
Block 1, Flat 2, Wuye District, Abuja.
Tel: 08179444443, 08038553466