Modern Cybersecurity Fundamentals
Published by Pearson
Security Principles, Incident Response, Ethical Hacking, AI Security, Cloud, IoT, and more
- Learn the fundamentals of the major cybersecurity concentrations such as incident response, digital forensics, ethical hacking, governance, compliance, and risk management
- Communicate with confidence regarding cybersecurity topics, terms, and concepts
- Learn about complex cybersecurity subjects in simple terms
Cybersecurity has never been more important. Cyberattacks are on the rise and demand for safe and secure data means that both companies and professionals need to keep their information secure. This in-depth 2-day training course by Omar Santos gives you the core skills you need to understand the essentials of cybersecurity fundamentals and get you started on your cyber career.
Day 1—You will dive right into core topics. Learn the basics, focusing on security concepts and exploring the core cybersecurity focus areas, along with incident response, threat hunting, and digital forensics.
Day 2—Now you’ll take your skills to the next level by exploring security operations, access control, ethical hacking, adversarial emulation, and security management. You will then explore cloud security, Internet of Things (IoT) security, and mobile device security. You will learn the importance of a secure development lifecycle (SDLC) before delving into how cyber security is affecting software development (including DevOps and cloud computing), as well as the concept of DevSecOps. You will be able to discuss various security technologies, including anti-malware, firewalls, intrusion detection systems, sniffers, ethical hacking tools, active defense, and threat hunting.
This comprehensive training is the foundation for learning everything you need to know to start your cybersecurity career. It will also help you prepare for numerous certifications, including CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), GIAC Information Security Fundamentals (GISF), or the GIAC Security Essentials (GSEC).
What you’ll learn and how you can apply it
By the end of the live online course, you’ll understand:
- Cybersecurity fundamentals and core cyber skills
- Threats, vulnerabilities, and exploits in today’s world and their associated risk
- The basics on incident response, digital forensics, network and host telemetry, PenTesting, cloud security, and so much more
And you’ll be able to:
- Understand the key topics in the world of cybersecurity
- Navigate key terms and concepts with confidence
- Start your cybersecurity journey, whether it’s learning key skills or studying for a certification
This live event is for you because...
- You are contemplating starting a career in cyber security.
- You would like to better understand cyber security concepts.
- You are studying for the CompTIA Security+, Cisco CyberOps Associate, Certified Ethical Hacker (CEH), GIAC Information Security Fundamentals (GISF), or the GIAC Security Essentials (GSEC) exam.
Prerequisites
- Course participants should have a basic understanding of computing and networking concepts.
Recommended Preparation
- Watch: The Complete Cybersecurity Bootcamp, 2nd Edition by Omar Santos
- Watch: Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition by Omar Santos and Nick Garner
Recommended Follow-up
- Attend: Becoming a Hacker: An Introduction to Ethical Hacking, Penetration Testing, and Bug Hunting by Omar Santos
- Attend Other Cybersecurity live trainings by Omar Santos
- Watch: The Art of Hacking Video Collection by Omar Santos, Ron Taylor, Jon Sternstein and Chris McCoy
- Read: CompTIA PenTest+ PT0-002 Cert Guide, 2nd Edition by Omar Santos
- Practice: Ethical Hacking Labs
Schedule
The time frames are only estimates and may vary according to how the class is progressing.
DAY ONE Cyber Security Foundational Concepts (60 minutes)
- Threats, Vulnerabilities, and Exploits and Their Associated Risks
- Understanding Defense-in-Depth
- Attacker Tactics, Techniques, and Procedures (TTPs)
- The CIA Triad in Real-Life
Break (10 minutes)
Introduction to Cryptography (75 minutes)
- Encryption Algorithms
- Hashing Algorithms
- Crypto Implementations
- The Challenges of Post-Quantum Cryptography
Break (10 minutes)
Introduction to Digital Forensics and Incident Response (DFIR) (75 minutes)
- Understanding the Incident Response Process
- Starting a Career in Incident Response
- Understanding CSIRTs, PSIRTs, and other Incident Response Teams
- Exploring Digital Forensics
- Evidence Preservation
- Chain of Custody
QA (10 minutes)
DAY TWO
Network and Host Telemetry (45 minutes)
- Collecting Information from Desktop/Laptops and Servers
- Gathering data from mobile devices
- Collecting information from network infrastructure devices
- Telemetry of systems and applications in the cloud
- Cyber Security Operations and Challenges
Access Control Models (35 minutes)
- Discretionary Access Control (DAC)
- Mandatory Access Control (MAC)
- Role-Based Access Control (RBAC)
- Attribute-Based Access Control (ABAC)
Break (10 minutes)
Introduction to Security Management and Governance (30 minutes)
- Understanding Governance, Risk and Compliance
- Creating Security Policies
- Legal & Regulatory Compliance
- Policies, Standards, & Procedures
- NIST Cybersecurity Framework
An Overview of Penetration Testing and Ethical Hacking (30 minutes)
- Penetration Testing Methodologies
- How to start a career in pen testing, bug hunting, and red teaming
- Ethical Hacking exercises and building your own hacking lab with WebSploit Labs
Break (10 minutes)
Introduction to Cloud Security (35 minutes)
- Identity and Access Management (IAM) in the Cloud
- Cloud Compute and Configuration Management
- Cloud Data Protection and Automation
- CloudNetworking and Logging
- Compliance, Incident Response, and Penetration Testing in the Cloud
Introduction to IoT Security (35 minutes)
- Introduction to IoT fundamentals and the threat landscape
- IoT Deployment Models and Cybersecurity Risks
- Data Protection, Privacy, Web/Cloud and Network Security
- Securing Production and the Supply Chain
- IoT Vulnerability Disclosure
- IoT Security Self-Certification, Legislation, Regulation and the Future
QA (10 minutes)
Your Instructor
Omar Santos
Omar Santos is a Distinguished Engineer at Cisco focusing on artificial intelligence (AI) security, research, incident response, and vulnerability disclosure. He is a board member of the OASIS Open standards organization and the founder of OpenEoX. Omar's collaborative efforts extend to numerous organizations, including the Forum of Incident Response and Security Teams (FIRST) and the Industry Consortium for Advancement of Security on the Internet (ICASI). Omar is the co-chair of the FIRST PSIRT Special Interest Group (SIG). Omar is the lead of the DEF CON Red Team Village and the chair of the Common Security Advisory Framework (CSAF) technical committee. Omar is the author of over 20 books, numerous video courses, and over 50 academic research papers. Omar is a renowned expert in ethical hacking, vulnerability research, incident response, and AI security. His dedication to cybersecurity has made a significant impact on technology standards, businesses, academic institutions, government agencies, and other entities striving to improve their cybersecurity programs.