top of page

Operational Cybersecurity 1B: Security & Planning in the Workplace

Kubersekuriteitspesialis 
Loopbaanbaan-kursuseenhede

Unit 1: Access Control in a Corporate Context
  • Explain the components that allow a user to be authorized on a network

  • Understand access control models and their uses

  • Recommend policies to protect against third-party vulnerabilities

  • Discuss the 2019 Capital One data breach

Unit 2: Authentication at Work
  • Explain authentication factors

  • Understand how biometrics are used as authentication factors

  • Identify protocols used in network-level authentication

  • Consider the use of single sign-on (SSO) and the implementation of authentication on switches and routers

  • Think about a perfect protocol scenario

Unit 3: Scenarios: Testing and Troubleshooting
  • Explain the need for continuous monitoring

  • Understand the basics of digital forensics

  • Describe the vulnerability scan process

  • Consider the penetration testing process

  • Plan possible post-scan actions

Unit 4: Response & Recovery Planning
  • Identify the difference between incident response and disaster recovery plans

  • Understand the NIST 800-61 incident response framework

  • Identify the steps in the Cyber Kill Chain®, MITRE ATT&CK, and Diamond model frameworks

  • Respond to a mock security incident

  • Conduct a post-incident analysis


Unit 5: Security Awareness & Training
  • Identify security awareness training frameworks

  • Explain various data classification categories

  • List examples of good workplace security habits

  • Consider positive security habits for Sys Admins

  • Understand hands-on learning opportunities in cybersecurity

Unit 6: Ethical Concerns in Cybersecurity
  • Identify different types of computer crimes and their consequences

  • Explain different types of copyright issues in the digital era

  • Understand how to handle data ethically

  • Consider data laws that are in place in the United States

  • Describe best practices concerning ethical behavior on networks and in personal digital activities

Unit 7: Personal Device Security
  • Define different device ownership models

  • Identify various security concerns related to employees bringing personal devices to work

  • Explain the purpose of mobile device management (MDM) platforms

  • List various MDM polices that can be enforced

  • Understand how Cisco Systems selected a new MDM

Unit 8: Gliders Expands
  • Define the cloud and discuss why an organization may use these types of platforms

  • Identify different cloud platform security controls

  • Consider cloud application security controls

  • Understand cloud security misconfigurations

bottom of page