Course Code: 28404

55374 Fundamentals of Cybersecurity and Zero Trust Course

Class Dates:
11/15/2024
9/13/2024
Length:
1 Days
Cost:
$600.00
Class Time:
Technology:
Server
Delivery:
Instructor-Led Training, Virtual Instructor-Led Training

Overview

  • Course Overview
  • This is a one-day course that provides a comprehensive understanding of cybersecurity, focusing on the complexities of the cybersecurity landscape, cryptography, and the influence of users, devices, and applications on the security perimeter. The course also introduces the Zero Trust framework as a strategy to enhance cybersecurity.

    Students are introduced to the basics of cybersecurity, gaining an understanding of the overall landscape, the role of encryption, the importance of user verification and access control, and the necessity of network and data protection.

    Students will learn how a Zero Trust strategy can be used to verify a user's identity, manage endpoints, control application behavior, protect networks, and secure data.
  • Audience
  • By the end of this module, students will have a comprehensive understanding of the benefits of a Zero Trust strategy, its role in user identity verification and access management, endpoint protection, application behavior control, network protection, and data security.

Prerequisites

  • Basic awareness of IT, devices, and applications.

Course Details

  • Benefits
  • Understand and describe the cybersecurity landscape.
  • Discuss how encryption works, and understand its broader uses in protecting your data.
  • Describe the differences between authentication and authorization.
  • Describe different network types, the network threat landscape, and how to protect them from cyberattacks.
  • Understand what a device is, how much a device knows about you, and how to reduce possible threats.
  • Describe the benefits of using a Zero Trust strategy to protect an organization’s digital estate.
  • After completing this module, students will be able to:
  • Describe the benefits of using a Zero Trust strategy to protect an organization’s digital estate.
  • Explain how Zero Trust can help verify a user’s identity and manage their access to your data.
  • Describe different endpoints and how to use Zero Trust strategies to protect them.
  • Describe how cloud applications and the data they access can be protected using Zero Trust principles.
  • Explain how Zero Trust can help identify cyberattacks and lateral movement in your network.
  • Describe Zero Trust strategies that can help you understand your data, mitigate data loss, and protect your data.
  • Module 1: Fundamentals of cybersecurity
  • An overview of cybersecurity
  • Encryption and its uses in cybersecurity
  • Verify your users and control their access
  • Protect your network and data
  • Every device is an attack vector
  • Application vulnerabilities
  • Lab 1: Fundamentals of cybersecurity
  • Paper-based exercise, with break-out session with scenario and discussion with the group on the outcome.
  • Module 2: Fundamentals of a Zero Trust strategy
  • What is a Zero Trust strategy
  • Identity and manage your users with Zero Trust
  • Manage endpoints with Zero Trust
  • Control application behavior with Zero Trust
  • Protect your networks using Zero Trust
  • Secure your data with Zero Trust
  • Lab 1: Fundamentals of a Zero Trust strategy