Preferred method of contact:

Cyber Security: Accessibility and Quality

COURSE TYPE

Intermediate

Course Number

3674

Duration

4 Days

PDF Add to WishList

Help your organization produce a comprehensive security posture by developing generally accepted practices. In this training course, you learn how perform security breaches with techniques from the FISMA Risk Management Framework, utilize protocol analyzers to track live attacks, analyze the effectiveness of security controls, and recommend improvements to block attacks.

You Will Learn How To

  • Protect assets by selecting and managing effective security controls
  • Evaluate the thoroughness and quality of security controls
  • Do more than just "security theater"
  • Provide and monitor a comprehensive, strong defence
  • Integrate accessibility into services and environments

Important Course Information

Recommended Experience:

  • Previous experience in networking and TCP/IP protocol stack
  • Technical background in networking and security terms

Course Outline

  • Introduction
  • Applying defense in depth: tools, techniques and people
  • Comprehending FISMA and OMB oversight
  • Assimilating Risk Management Framework Security Life Cycle
  • Risk Management Framework

Multi-tiered risk management

  • Organization: Strategic risk management
  • Mission/Business: Tactical approach to risk
  • Information Systems

Defining roles and responsibilities

  • Distinguishing hierarchy and key roles of risk management
  • Defining responsibilities assigned to specific roles
  • Separating roles and areas of responsibility

Phases of risk management

  • Categorizing information systems
  • Selecting security controls
  • Implementing security controls
  • Assessing security controls
  • Authorizing information systems
  • Monitoring security controls
  • Information Assurance

Introducing information assurance

  • Assuring security throughout the data life cycle
  • Integrating information assurance into software development
  • Building in "secure by design"
  • Implementing information assurance best practices
  • Ensuring component security

Penetration testing and vulnerability assessments

  • Validating security functions and configuration
  • Finding weaknesses within systems before the attacker does

Keeping current with information assurance

  • Full disclosure vs. responsible disclosure
  • Exploring vulnerability databases
  • Information Systems and Network Security

Modularization (the OSI 7 Layer Model)

  • Networking principles powering the Internet
  • Modeling a packet

Confidentiality, integrity and availability across the network

  • Encrypting for confidentiality
  • Sniffing the network and protocol analysis
  • Modifying data via man-in-the-middle attacks

Networking services and security

  • Poisoning the DNS cache
  • Incorporating core services including DHCP, ICMP, and ARP
  • Hardening the TCP/IP stack
  • Authentication and Access Control

Authenticating users

  • Managing factors of authentication (something you know, have or are)
  • Attacking passwords
  • Comprehending PKI and public key authentication systems
  • Evaluating the suitability of biometrics
  • Integrating multi-factor authentication

Authenticating hosts

  • Incorporating ARP, DHCP, DNS and protocol insecurities
  • Performing and detecting MAC and IP address spoofing
  • Achieving strong host authentication
  • Analyzing Kerberos and IPSec
  • Cryptography

Encrypting and exercising integrity functions

  • Capitalizing on asymmetric or Public Key cryptography
  • Applying symmetric cryptography
  • Exercising message digest functions for integrity

Certificates and Certification Authorities

  • Clarifying PKI and certificate fields
  • Publishing certificate revocation and certificate security

Digital signatures

  • Digitally signing for strong authentication
  • Proving authentication, integrity and non-repudiation
  • Accessibility
  • Promoting open data policies
  • Removing barriers to enhance accessibility for people
  • Enabling IT accessibility
Show complete outline
Show Less

Convenient Ways to Attend This Instructor-Led Course

Hassle-Free Enrolment: No advance payment required to reserve your seat.
Tuition due 30 days after you attend your course.

In the Classroom

Live, Online

Private Team Training

In the Classroom — OR — Live, Online

Tuition — Standard: $3285   Government: $2890

Apr 3 - 6 (4 Days)
9:00 AM - 4:30 PM EDT
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

May 8 - 11 (4 Days)
9:00 AM - 4:30 PM EDT
Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Sep 4 - 7 (4 Days)
9:00 AM - 4:30 PM EDT
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Oct 30 - Nov 2 (4 Days)
9:00 AM - 4:30 PM EDT
Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Guaranteed to Run

Private Team Training

Enroling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training.

For details, call 1-888-843-8733 or Click here »

Tuition

Standard

Government

In Classroom or
Online

Standard

$3285

Government

$2890

Private Team Training

Contact Us »

Course Tuition Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online at any time after class and receive a Certificate of Achievement with the designation "Awarded with Distinction."

Prev
Next

Training Hours

Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm

FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:

  • Have a record of your growth and learning results
  • Bring proof of your progress back to your organization
  • Earn credits toward industry certifications (if applicable)

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

- ,

Prev
Next
Chat Now

Please Choose a Language

Canada - English

Canada - Français