Maxtrain.com - info@maxtrain.com - 513-322-8888 - 866-595-6863
Certified Security Principles
Description
Certified Security Principles Introduction
Welcome to the Certified Security Principles C)SP course, your foundational journey into the realm of IT security.
As digital landscapes evolve and the integration of IoT and cloud technologies expands, the importance of robust IT security measures has never been more critical. This course is designed to address the increasing prevalence of security breaches, many of which originate internally, by empowering employees with the necessary knowledge to strengthen organizational security.
During this comprehensive training, you will explore essential security domains including risk management, identity and access management, network security, and data protection. By dissecting the complexity of current threat landscapes and the specific challenges posed by new technologies, this course prepares you to effectively safeguard sensitive information and infrastructures.
Completing this well-structured course will not only prepare you for the C)SP exam but also provide you with foundational security knowledge to safeguard an organization’s intellectual property and IT infrastructure effectively.
Certified Security Principles Exam Information
- A minimum grade of 80% is required for certification.
Certified Security Principles Course Accreditation
- Accredited by the NSA-CNSS.
- Approved on Homeland Security NICCS Framework.
- Listed on the FBI’s Tier 1-3 Certification Training Chart.
Certified Security Principles Course Objectives
- Understand the fundamental principles of IT security and the dynamics of threat landscapes.
- Gain proficiency in managing risks and securing identities and access within various environments.
- Develop skills to protect networks and data from security breaches, particularly in IoT and cloud contexts.
- Learn to identify internal threats and enhance security through strategic employee education and awareness.
Prerequisites
- 12 Months of experience with server administration
Or - C)SA1, C)SA2, C)HT, C)OST and C)NP
Or - Equivalent Knowledge
Audience
- IT Professionals
- Server Administrators
- Virtualization and Cloud Administrators
Certified Security Principles Course Outline
Introduction to IT Security
- Understanding the concept of security
- Responsibilities in IT security
- Building a security program
- The CIA Triad (Confidentiality, Integrity, Availability)
- Governance, Risk, Compliance (GRC)
- The current state of security
Risk Management
- The fundamentals of risk management
- Risk assessment techniques
- Identifying types of risk, threats, and vulnerabilities
- Mitigating security attacks
- Detecting vulnerabilities and threats
- Responding to risk incidents
Understanding Cryptography
- Introduction to cryptography
- Symmetric and asymmetric encryption
- Hashing techniques
- Public Key Infrastructure (PKI)
- Practical applications of cryptography
Understanding Identity and Access Management
- Identity management principles
- Authentication methods and techniques
- Single Sign-On (SSO)
- Access control monitoring
Managing Data Security
- Principles of virtualization
- Cloud layer components
- Key security concerns in cloud environments
- Relevant Cloud Controls Matrix (CCM) controls
Data Security
- Different types of data storage
- Encryption options for data security
- Effective data management practices
Managing Server/Host Security
- Securing operating systems
- Hardening the OS for security
- Physical security considerations
- Virtualization and cloud security technologies
Application Security for Non-Developers
- Introduction to application security principles
- Overview of the Software Development Life Cycle (SDLC)
- Understanding the OWASP Top 10 vulnerabilities
- Hardening web applications
- Patch, update, and configuration management
Understanding Mobile Device Security (IoT)
- Identifying the scope of mobile and IoT devices
- Assessing the risks associated with mobile and IoT devices
- Strategies for hardening mobile and IoT devices
- Corporate management of mobile and IoT devices
Managing Day-to-Day Security
- Organizational responsibilities for security
- Product management in a security context
- Basics of business continuity
- Incident response best practices
- Importance of ongoing training
Understanding Compliance and Auditing
- Benefits of compliance in security
- Assurance frameworks for compliance
- The role of auditing in maintaining security
Outline
Module 1 – Introduction to IT Security
a. Understanding Security
b. Responsibilities
c. Building a Security Program
d. CIA Triad
e. Governance, Risk, Compliance
f. State of Security Today
Module 2 – Risk Management
a. Risk Management
b. Risk Assessment
c. Types of Risk, Threats and Vulnerabilities
d. Mitigating Attacks
e. Discovering Vulnerabilities and Threats
f. Responding to Risk
Module 3 – Understanding of Cryptography
a. Understanding Cryptography
b. Symmetric Encryption
c. Asymmetric Encryption
d. Hashing
e. PKI
f. Cryptography in Use
Module 4 – Understanding Identity and Access Management
a. Identity Management
b. Authentication Techniques
c. Single Sign-on
d. Access Control Monitoring
Module 5 – Managing Data Security
a. Virtualization Principles
b. Key Components Mapped to Cloud Layer
c. Key Security Concerns
d. Other Technologies Used in the Cloud
e. The Layers
f. Relevant CCM Controls
Module 6 – Data Security
a. Different Types of Storage
b. Encryption Options
c. Data Management
Module 7 – Managing Server/Host Security
a. The Operating Systems
b. Hardening the OS
c. Physical security
d. Virtualization and Cloud Technologies
Module 8 – Application Security for Non-Developers
a. Application Security Principle
b. Software Development Life Cycle
c. OWASP Top 10
d. Hardening Web Applications
e. Patch/Update/Configuration Management
Module 9 – Understanding Mobile Device Security (IoT)
a. What Devices are we talking about?
b. What is the risk?
c. Hardening Mobile/IoT Devices
d. Corporate Management
Module 10 – Managing Day to Day Security
a. Company Responsibilities
b. Product Management
c. Business Continuity Basics
d. Incident Response
e. Why Train?
Module 11 – Understating Compliance and Auditing
a. Benefits of Compliance
b. Assurance Frameworks
c. What is Auditing
$3000.00
|
5 Days Course |