Skip to content
  • Sign In
  • Try Now
View all events
Security

Modern Cybersecurity Fundamentals

Published by Pearson

Beginner content levelBeginner

Security Principles, Incident Response, Ethical Hacking, AI Security, Cloud, IoT, and more

  • Learn the fundamentals of the major cybersecurity concentrations such as incident response, digital forensics, ethical hacking, governance, compliance, and risk management
  • Communicate with confidence regarding cybersecurity topics, terms, and concepts
  • Learn about complex cybersecurity subjects in simple terms

Cybersecurity has never been more important. Cyberattacks are on the rise and demand for safe and secure data means that both companies and professionals need to keep their information secure. This in-depth 2-day training course by Omar Santos gives you the core skills you need to understand the essentials of cybersecurity fundamentals and get you started on your cyber career.

Day 1—You will dive right into core topics. Learn the basics, focusing on security concepts and exploring the core cybersecurity focus areas, along with incident response, threat hunting, and digital forensics.

Day 2—Now you’ll take your skills to the next level by exploring security operations, access control, ethical hacking, adversarial emulation, and security management. You will then explore cloud security, Internet of Things (IoT) security, and mobile device security. You will learn the importance of a secure development lifecycle (SDLC) before delving into how cyber security is affecting software development (including DevOps and cloud computing), as well as the concept of DevSecOps. You will be able to discuss various security technologies, including anti-malware, firewalls, intrusion detection systems, sniffers, ethical hacking tools, active defense, and threat hunting.

This comprehensive training is the foundation for learning everything you need to know to start your cybersecurity career. It will also help you prepare for numerous certifications, including CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), GIAC Information Security Fundamentals (GISF), or the GIAC Security Essentials (GSEC).

What you’ll learn and how you can apply it

By the end of the live online course, you’ll understand:

  • Cybersecurity fundamentals and core cyber skills
  • Threats, vulnerabilities, and exploits in today’s world and their associated risk
  • The basics on incident response, digital forensics, network and host telemetry, PenTesting, cloud security, and so much more

And you’ll be able to:

  • Understand the key topics in the world of cybersecurity
  • Navigate key terms and concepts with confidence
  • Start your cybersecurity journey, whether it’s learning key skills or studying for a certification

This live event is for you because...

  • You are contemplating starting a career in cyber security.
  • You would like to better understand cyber security concepts.
  • You are studying for the CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), GIAC Information Security Fundamentals (GISF), or the GIAC Security Essentials (GSEC) exam.

Prerequisites

  • Course participants should have a basic understanding of computing and networking concepts.

Recommended Preparation

Recommended Follow-up

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

DAY ONE Cyber Security Foundational Concepts (60 minutes)

  • Threats, Vulnerabilities, and Exploits and Their Associated Risks
  • Understanding Defense-in-Depth
  • Attacker Tactics, Techniques, and Procedures (TTPs)
  • The CIA Triad in Real-Life

Break (10 minutes)

Introduction to Cryptography (75 minutes)

  • Encryption Algorithms
  • Hashing Algorithms
  • Crypto Implementations
  • The Challenges of Post-Quantum Cryptography

Break (10 minutes)

Introduction to Digital Forensics and Incident Response (DFIR) (75 minutes)

  • Understanding the Incident Response Process
  • Starting a Career in Incident Response
  • Understanding CSIRTs, PSIRTs, and other Incident Response Teams
  • Exploring Digital Forensics
  • Evidence Preservation
  • Chain of Custody

QA (10 minutes)

DAY TWO

Network and Host Telemetry (45 minutes)

  • Collecting Information from Desktop/Laptops and Servers
  • Gathering data from mobile devices
  • Collecting information from network infrastructure devices
  • Telemetry of systems and applications in the cloud
  • Cyber Security Operations and Challenges

Access Control Models (35 minutes)

  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)
  • Attribute-Based Access Control (ABAC)

Break (10 minutes)

Introduction to Security Management and Governance (30 minutes)

  • Understanding Governance, Risk and Compliance
  • Creating Security Policies
  • Legal & Regulatory Compliance
  • Policies, Standards, & Procedures
  • NIST Cybersecurity Framework

An Overview of Penetration Testing and Ethical Hacking (30 minutes)

  • Penetration Testing Methodologies
  • How to start a career in pen testing, bug hunting, and red teaming
  • Ethical Hacking exercises and building your own hacking lab with WebSploit Labs

Break (10 minutes)

Introduction to Cloud Security (35 minutes)

  • Identity and Access Management (IAM) in the Cloud
  • Cloud Compute and Configuration Management
  • Cloud Data Protection and Automation
  • CloudNetworking and Logging
  • Compliance, Incident Response, and Penetration Testing in the Cloud

Introduction to IoT Security (35 minutes)

  • Introduction to IoT fundamentals and the threat landscape
  • IoT Deployment Models and Cybersecurity Risks
  • Data Protection, Privacy, Web/Cloud and Network Security
  • Securing Production and the Supply Chain
  • IoT Vulnerability Disclosure
  • IoT Security Self-Certification, Legislation, Regulation and the Future

QA (10 minutes)

Your Instructor

  • Omar Santos

    Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs.

    linkedinXlinksearch