Description
In this course, you will learn:
- Dissecting cyber risk
- Working with NIST, COBIT, and other frameworks
- Exploring cybercrime
- The different stages of the cyber kill chain
- How cybercriminals hide their attacks
- Measuring incident management maturity
- Detecting and responding to attacks
Syllabus:
- Introduction
- cybersecurity
- What you should know
1. Frameworks and Controls
- The Orange Book: Early concepts in computer security
- Understanding the NIST Cybersecurity Framework
- Adopting the NIST Cybersecurity Framework
- Understanding the basics of cyber risk
- Analyzing cyber threats and controls
- Recording, reporting, and the risk context
- An advanced risk framework
- Managing security with COBIT
- COBIT for operational security
- Introduction to cybersecurity controls
- Cybersecurity control framework
- The ISF Standard of Good Practice
- ASD and its top controls
- Protecting payment card data
- Clouding the issues
- Securing things on the internet
- Making sure security is effective
2. Cyber Threats
- Understanding the cyber kill chain
- Revisiting traditional threats
- Botnets and the cyber crime industry
- Cloaking and alternate data streams
- Hiding using processes
- Controlling the target through a rootkit
- Understanding advanced persistent threats
- Ransomware: A modern form of extortion
- Hardware implants and other cyber FUD
3. Managing Cyber Incidents
- Incident management basics
- Measuring incident management maturity
- Detecting an attack
- Responding to an incident