• About
  • Training
    • Information Technology
    • Business Analysis
    • Leadership
    • Project Management
    • Certifications
    • Public Schedule
  • Why Choose Us
  • Blog
  • Contact
  • Search

Contact us - (866) 543-0520    |    info@velocityknowledge.com

  • About
  • Training
    • Information Technology
    • Business Analysis
    • Leadership
    • Project Management
    • Certifications
    • Public Schedule
  • Why Choose Us
  • Blog
  • Contact
  • Search

  1. Home
  2. Training
  3. Cybersecurity Foundations

Cybersecurity Foundations

Course Overview

When you consider just a few of the consequences of a security breach – your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company’s security breach, it becomes obvious: An in-depth and thorough understanding of cyber security fundamentals and best practices is absolutely necessary.

In this 5-day cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.

What You’ll Learn:

  • Current cyber threats and cybersecurity site references
  • Government-mandated directives and compliance requirements
  • Cyber roles required to successfully design secure systems
  • The attack cycle perpetrated by malicious hackers
  • Enterprise policy requirements
  • Best strategies for securing the enterprise with layered defenses
  • How security zones and detailed logging augment information assurance
  • Forensic challenges and incident response planning
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Industry recommendations for maintaining secure access control
  • Standards-based cryptographic solutions for securing communications

Who Needs to Attend

Cybersecurity professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants

Please contact us for a detailed course outline.

Get Course Information

(866) 543-0520
info@velocityknowledge.com

Why Choose Us

Velocity Knowledge is a new breed of Enterprise Learning Organization that brings collaborative learning strategies to its clients through classroom, virtual classroom and project-based modalities.

Contact
Phone

(866) 543-0520

Email

info@velocityknowledge.com

Quick Menu
  • About
  • Why Choose Us
  • Contact
Velocity Knowledge

© Copyright 2022 by Velocity Knowledge. All rights reserved.

  • About
  • Training
    • Information Technology
    • Business Analysis
    • Leadership
    • Project Management
    • Certifications
    • Public Schedule
  • Why Choose Us
  • Blog
  • Contact
  • Search