Certiport - Cybersecurity

Varaktighet

Varaktighet:

Bara 2 dagar

Metod

Metod:

Klassrum / Uppkopplad / Hybrid

Nästa datum

Nästa datum:

24/6/2024 (Måndag)

Overview

This accelerated Certiport Cybersecurity, Information Technology Specialist program is a way for students validate entry level IT skills sought after by employers. The IT Specialist program is aimed at candidates who are considering or just beginning a path to a career in information technology.

Candidates for this exam are starting their journey in the cybersecurity field. This exam assesses their understanding of key security paradigms, terminology, and mindset. Successful candidates will have a keen awareness of the importance of security and the threats to a business when security procedures are not followed. They are willing to teach others about security concerns. They are developing the investigative and implementation skills necessary to succeed in the field and have an aptitude and desire to learn more.

At the end of this course, you’ll achieve your Certiport Cybersecurity certification.

Through Firebrand’s Lecture | Lab | Review methodology you’ll certify at twice the speed of traditional training and get access to courseware, learn from certified instructors, and train in a distraction-free environment.

 40% faster

Distraction-free environment

Audience

Candidates for this exam are starting their journey in the cybersecurity field. This exam assesses their understanding of key security paradigms, terminology, and mindset. Successful candidates will have a keen awareness of the importance of security and the threats to a business when security procedures are not followed. They are willing to teach others about security concerns. They are developing the investigative and implementation skills necessary to succeed in the field and have an aptitude and desire to learn more.

Sju anledningar till varför du bör välja din kurs med Firebrand Training

  1. Två utbildningsalternativ. Välj mellan boende på plats med klassrumsundervisning eller onlinekurser
  2. Du blir certifierad snabbt. Hos oss blir du utbildad rekordsnabbt
  3. Vår kurs är heltäckande. En engångsavgift täcker alla kursmaterial, examina**, boende* och måltider*. Inga dolda extra kostnader.
  4. Godkänn första gången eller träna om gratis. Detta är vår garanti. Vi är övertygade om att du kommer klara kursen på första försöket. Men om inte, kom tillbaka inom ett år och betala endast för boende, examina och tillkommande kostnader
  5. Du kommer lära dig mer. En dag med en traditionell utbildningsleverantör brukar generellt pågå från kl. 9 till 17, med en lång paus för lunch. Med Firebrand Training får du minst 12 timmar/dag av kvalitativ inlärningstid med din instruktör
  6. Du kommer lära dig snabbare. Sannolikheten är att du har en annan inlärningsstil än de omkring dig. Vi kombinerar visuella, auditiva och taktila stilar för att leverera materialet på ett sätt som säkerställer att du lär dig snabbare och enklare
  7. Du kommer studera med de bästa. Vi har varit med på Training Industrys lista "Top 20 IT Training Companies of the Year" varje år sedan 2010. Förutom många fler utmärkelser har vi utbildat och certifierat över 100 000 yrkesverksamma
  • * Endast för boende på plats. Gäller inte för onlinekurser
  • ** Vissa undantag gäller. Vänligen se Exam Track eller prata med våra experter

Curriculum

CertiPort Cybersecurity

  1. Essential Security Principles

1.1 Define essential security principles

• Vulnerabilities, threats, exploits, and risks; attack vectors; hardening; defense-in-depth; confidentiality, integrity, and availability (CIA); types of attackers; reasons for attacks; code of ethics

1.2 Explain common threats and vulnerabilities

• Malware, ransomware, denial of service, botnets, social engineering attacks (tailgating, spear phishing, phishing, vishing, smishing, etc.), physical attacks, man in the middle, IoT vulnerabilities, insider threats, Advanced Persistent Threat (APT)

1.3 Explain access management principles

• Authentication, authorization, and accounting (AAA); RADIUS; multifactor authentication (MFA); password policies

1.4 Explain encryption methods and applications

• Types of encryption, hashing, certificates, public key infrastructure (PKI); strong vs. weak encryption algorithms; states of data and appropriate encryption (data in transit, data at rest, data in use); protocols that use encryption

 

2. Basic Network Security Concepts

2.1 Describe TCP/IP protocol vulnerabilities

• TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS

2.2 Explain how network addresses impact network security

• IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks

2.3 Describe network infrastructure and technologies

• Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS

2.4 Set up a secure wireless SoHo network

• MAC address filtering, encryption standards and protocols, SSID

2.5 Implement secure access technologies

• ACL, firewall, VPN, NAC 3. Endpoint Security Concepts

 

3.1 Describe operating system security concepts

• Windows, macOS, and Linux; security features, including Windows Defender and host-based firewalls; CLI and PowerShell; file and directory permissions; privilege escalation

3.2 Demonstrate familiarity with appropriate endpoint tools that gather security assessment information

• netstat, nslookup, tcpdump

3.3 Verify that endpoint systems meet security policies and standards

• Hardware inventory (asset management), software inventory, program deployment, data backups, regulatory compliance (PCI DSS, HIPAA, GDPR), BYOD (device management, data encryption, app distribution, configuration management)

3.4 Implement software and hardware updates

• Windows Update, application updates, device drivers, firmware, patching

3.5 Interpret system logs

• Event Viewer, audit logs, system and application logs, syslog, identification of anomalies

3.6 Demonstrate familiarity with malware removal

• Scanning systems, reviewing scan logs, malware remediation

 

4. Vulnerability Assessment and Risk Management

4.1 Explain vulnerability management

• Vulnerability identification, management, and mitigation; active and passive reconnaissance; testing (port scanning, automation)

4.2 Use threat intelligence techniques to identify potential network vulnerabilities

• Uses and limitations of vulnerability databases; industry-standard tools used to assess vulnerabilities and make recommendations, policies, and reports; Common Vulnerabilities and Exposures (CVEs), cybersecurity reports, cybersecurity news, subscription services, and collective intelligence; ad hoc and automated threat intelligence; the importance of updating documentation and other forms of communication proactively before, during, and after cybersecurity incidents; how to secure, share and update documentation

4.3 Explain risk management

• Vulnerability vs. risk, ranking risks, approaches to risk management, risk mitigation strategies, levels of risk (low, medium, high, extremely high), risks associated with specific types of data and data classifications, security assessments of IT systems (information security, change management, computer operations, information assurance)

4.4 Explain the importance of disaster recovery and business continuity planning

• Natural and human-caused disasters, features of disaster recovery plans (DRP) and business continuity plans (BCP), backup, disaster recovery controls (detective, preventive, and corrective)

 

5. Incident Handling

5.1 Monitor security events and know when escalation is required

• Role of SIEM and SOAR, monitoring network data to identify security incidents (packet captures, various log file entries, etc.), identifying suspicious events as they occur

5.2 Explain digital forensics and attack attribution processes

• Cyber Kill Chain, MITRE ATT&CK Matrix, and Diamond Model; Tactics, Techniques, and Procedures (TTP); sources of evidence (artifacts); evidence handling (preserving digital evidence, chain of custody)

5.3 Explain the impact of compliance frameworks on incident handling

• Compliance frameworks (GDPR, HIPAA, PCI-DSS, FERPA, FISMA), reporting and notification requirements 5.4 Describe the elements of cybersecurity incident response

• Policy, plan, and procedure elements; incident response lifecycle stages (NIST Special Publication 800-61 sections 2.3, 3.1-3.4)

Exam Track

As part of your accelerated course, you’ll sit the following exam at the Firebrand Training centre, covered by your Certification Guarantee:

40 - 50 MCQ Questions

Duration - 50 Minutes

What's Included

Prerequisites

Successful candidates will have a keen awareness of the importance of security and the threats to a business when security procedures are not followed. They are willing to teach others about security concerns. They are developing the investigative and implementation skills necessary to succeed in the field and have an aptitude and desire to learn more. They are familiar with the toolset at a fundamental level and can assist in threat mitigation and incident response. Candidates should have at least 150 hours of instruction or hands-on experience knowledge and skills. Candidates should have at least 150 hours of instruction or hands-on experience with cybersecurity.

To be successful on the test, the candidate is also expected to have the following prerequisite knowledge and skills:

  • 8th grade reading, writing and communication skills
  • Algebra 1
  • Critical thinking and problem-solving skills
  • General operating system knowledge (Windows, MacOS, Linux)
  • Familiarity with connecting to a wireless network with common commercial components
  • Familiarity with setting up a simple home network

Är du redo för din Firebrand kurs?

Vi intervjuar alla potentiella deltagare om deras bakgrund, utbildning, certifiering och personliga inställning. Om du kommer igenom denna process så har du riktigt goda möjligheter att klara din certifiering.

Firebrand Training erbjuder en ambitiös utbildningsmiljö som förutsätter att du verkligen dedikerar dig till kursen. Ovanstående förkunskaper är endast vägledande, många deltagare med mindre erfarenhet men med en annan bakgrund eller kunskap har framgångsrikt genomfört sin utbildning hos Firebrand Training.

Om du funderar på huruvida du uppfyller rekommenderade förkunskaper vänligen ring oss på (0)8 44 68 27 85 och prata med en av våra utbildningsrådgivare som kan hjälpa dig.

Kundreferenser

Här är Firebrand Training recension avsnittet. Sedan 2001 har vi utbildat exakt 134.561 studenter och proffs och bett dem alla att recensera vår Accelerated Learning. För närvarande har, 96,41% sagt att Firebrand överträffade deras förväntningar.

Läs recensioner från avslutade accelereradekurser nedan eller besök Firebrand Stories för skriftliga och videointervjuer med våra tidigare alumni.


"Professional Tutors are there to help and guide you whenever you need the help. Consistent tests and exams to ensure improvement in knowledge."
Anonymous. (8/1/2024 (Måndag) till 11/1/2024 (Torsdag))

"Firebrand are very efficient with their learning and have great learning mentors who will do their best to provide a great learning experience."
ED. (8/1/2024 (Måndag) till 11/1/2024 (Torsdag))

"The training here is excellent and they teach in a very good way that ensures you understand things before moving forward."
Simon Dodd, Pervade Software Ltd. (8/1/2024 (Måndag) till 11/1/2024 (Torsdag))

"Really good experience with a great few days of learning"
OR. (18/9/2023 (Måndag) till 21/9/2023 (Torsdag))

"An excellent trainer who explained everything in great detail. Very happy to attend other training he delivers!"
Craig Neal, Care Quality Commission. (14/8/2023 (Måndag) till 17/8/2023 (Torsdag))

Kursdatum

Startar

Slutar

Tillgänglighet

Plats

Registrera

19/2/2024 (Måndag)

20/2/2024 (Tisdag)

Avslutad - Lämna feedback

-

 

24/6/2024 (Måndag)

25/6/2024 (Tisdag)

Väntelista

Rikstäckande

 

5/8/2024 (Måndag)

6/8/2024 (Tisdag)

Begränsat antal platser

Rikstäckande

 

16/9/2024 (Måndag)

17/9/2024 (Tisdag)

Platser tillgängliga

Rikstäckande

 

28/10/2024 (Måndag)

29/10/2024 (Tisdag)

Platser tillgängliga

Rikstäckande

 

9/12/2024 (Måndag)

10/12/2024 (Tisdag)

Platser tillgängliga

Rikstäckande

 

Senaste recensioner från våra studenter