Pre-Conference CSX Training Workshop

Starts:  Sep 9, 2019 08:30 (CT)
Ends:  Sep 10, 2019 17:00 (CT)
Associated with  Regina Chapter
Class Information
This is a two-day class. Classes will run from 8:30am – 5:00pm each day.

Target Audience
0 to 3 years cybersecurity experience. Audit, risk, compliance, information security, governance and legal professionals with a familiarity of basic IT/IS concept, who are either new to cybersecurity, interested in entering the field of cybersecurity, and/or who are interested in the ISACA Cybersecurity Fundamentals Certificate.

Overview
Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT). The CSX Fundamental Course is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. Designed as a foundational course, it will also prepare learners for the CSX Cybersecurity Fundamentals Exam. Attendance at this Course will not guarantee passage of any ISACA offered certification.

Topics Covered
CSX Fundamentals Domain 1 Cyber Security Concepts Lessons
  • Cyber security principles used to manage risks related to the use, processing, storage and transmission of information or data.
  • Security Management
  • Risk Management Processes, including steps and methods for assessing risk.
  • Threat Actors
  • Cyber Security Roles
  • Common Adversary Tactics, Techniques, and Procedures (TTPs)
  • Relevant Laws, Policies, Procedures and Governance Requirements.
  • Cyber Security Controls

CSX Fundamentals Domain 2 Security Implications and Adoption of Evolving Technology Lessons
  • Network Design Processes, to include an understanding of security objectives, operational objectives, and trade-offs.
  • Security System Design Methods, Tools and Techniques.
  • Network Access, Identity and Access Management
  • Information Technology (IT) Security Principles and Methods
  • Network Security Architecture Concepts, including topology, protocols, components, and principles
  • Malware Analysis Concepts and Methodology
  • Intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies
  • Defense in Depth Principles and Network Security Architecture
  • Encryption Algorithms
  • Cryptography
  • Encryption Methodologies
  • The process of traffic flows across the network (e.g. transmission and encapsulation)
  • Network Protocols, Dynamic Host Configuration Protocol, and Directory Services
CSX Fundamentals Domain 3 Security of Networks, Systems, Applications and Data Lessons
  • Vulnerability Assessment Tools and their Capabilities
  • Basic System Administration, Network and Operating System Hardening Techniques
  • Risk Associated with Virtualizations
  • Penetration Testing
  • Network Systems Management Principles, Modules, Methods and Tools
  • Remote Access Technology
  • Unix Command Line
  • System and Application Security Threats and Vulnerabilities
  • System Life Cycle Management Principles, including software security and usability
  • Local Specialized System Requirements for Safety, Performance, and Reliability.
  • System and Application Security Threats and Vulnerabilities
  • Social Dynamics of Computer Attackers in a Global Context
  • Secure Configuration Management Techniques
  • Capabilities and Applications of Network Equipment including Hubs, Routers, Switches, Bridges, Servers, Transmission Media and Related Hardware.
  • Communication Methods, Principles, and Concepts that Support the Network Infrastructure
  • Common Networking Protocols and Services and how they Interact to Provide Network Communications.
  • Different Types of Network Communication
  • Virtualization Technologies and Virtual Machine Development and Maintenance • Application Security
  • Risk Threat Assessment
CSX Fundamentals Domain 4 Incident Response Lessons
  •  Incident Categories and Response
  • Business Continuity/Disaster Recovery
  • Incident Response and Handling Methodologies
  • Security Event Correlation Tools • Processes for Seizing and Preserving Digital Evidence
  • Types of Digital Forensics Data
  • Basic Concepts and Practices of Processing Digital Forensics Data
  • Anti-Forensics Tactics, Techniques, and Procedures (TTPS)
  • Common Forensic Tool Configuration and Support Applications
  • Network Traffic Analysis Methods
  • Which System Files Contain Relevant Information and Where to Find Those System Files
CSX Fundamentals Domain 5: Security Implications and Adoption of Evolving Technology Lessons
  • Emerging Technology and Associated Security Issues, Risks and Vulnerabilities
  • Risk Associated with Mobile Computing
  • Cloud Concepts Around Data and Collaboration
  • Risk of Moving Applications and Infrastructure to the Cloud
  • Risk Associated with Outsourcing
  • Supply Chain Risk Management Processes and Practices
Extra Material: Cybersecurity Framework
  • Discuss the NIST Cybersecurity Framework
  • Delve into the 5 main categories
  • Discuss how it could be used to assess an organizations Cybersecurity maturity
  • Conduct a sample assessment

Location

Queensbury Convention Centre
1700 Elphinstone St
Regina, SK S4P 2Z6

Contact

Cliff Janzen

isacaregina@gmail.com