Foundation Certificate in Cyber Security Training

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 5 Days
  • Price: Please contact for booking options
Upcoming Training
25 September 2023
5 Days
We can host this training at your preferred location. Contact us!

The objective of the course is to provide a comprehensive but necessarily high level overview across industry standard technology and platforms, illuminating the technology and its specific cyber governance, risk and assurance challenges without technically challenging the learner to hands-on labs.

The course takes the learner back to computer basics to build the individuals understanding common technology platforms through to the network layer and on via virtualisation technologies, cloud systems, telecoms and modern communications and finishing with an insight into the world of protective monitoring, challenges and pitfalls of security events logs and analysis. Common methods of attack provides the learner with an insight into many of the most popular attack vectors today. Closing the third day with a module focused on the benefits and pitfalls of encryption.

Day four begins with the cyber law and the context in which security practitioners and organisations have to operate within. Each of us has a digital footprint and the technology we use within our enterprise as an attack surface, the next module joins these two principles and explains the challenges for assurance around leaky data. During the remainder of day four and five we introduce the layered cyber concepts and the deeper governance required throughout the entire lifecycle covering a number of specialist areas essential to the rounded security practitioner.

Each day provides insight into the technical subject matter with the crucial security subtext. Knowledge check exercises, where delegates work in groups to discuss and provide solutions to scenarios offering an explanation with a rationale in each instance of why this is important from a security assurance perspective.

During the delivery we will provide the delegates with access to recorded video demonstrations of the technical subject matter, which will enhance the learners experience whilst preserving any technical confidence as there are no requirements for the learner to undertake any 'hands-on' labs.

IISP Skills Alignment

This course is aligned to the following Institute of Information Security Professionals (IISP) Skills. More details on the IISP skills framework can be found here.

IISP Skills: A1, A2, A6, A7, B1, B2, C1, C2, D1, D2, E1, E2, E3, F2, G1

Continuous Professional Development (CPD)

CPD points can be claimed for GCT accredited courses at the rate of 1 point per hour of training for GCHQ accredited courses (up to a maximum of 15 points).

There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.

1. Gün

Bilgi İşlem Temelleri, Veri Depolama ve Bellek

Bilgisayar sistemi bileşenleri, işletim sistemleri (Windows, Linux ve Mac), farklı depolama türleri, dosya sistemleri (FAT ve NTFS), bellek yönetimi.

OSI Protokol Yığını

Anahtarlamalı ağlar, paket anahtarlamaya karşı devre anahtarlama, paket yönlendirme dağıtımı, yönlendirme, internetworking standartları, OSI modeli ve 7 katman.

TCP/IP

TCP/IP protokol paketi, adres türleri, fiziksel adres, mantıksal adres, IPv4, IPv6, port adresi, özel adres, ağ erişim kontrolü,


2. Gün

Ağ Mimarisi

Ağ temelleri, ağ türleri (avantajlar ve dezavantajlar), WAN vs LAN, DHCP

Internet Primer

Veriler internette nasıl dolaşır? Web'de gezinme, e-posta gönderme, uygulamaları kullanma için uçtan uca örnekler - internet mimarisi, yönlendirme, DNS'nin açıklanması.

Ağ Güvenliği

Güvenli planlama, politikalar ve mekanizmalar, Active Directory yapısı, Grup Politikasına giriş (kapsayıcılar, şablonlar, GPO), güvenlik ve ağ katmanları, IPSEC, SSL / TLS (kusurlar ve karşılaştırmalar) SSH, Güvenlik Duvarları (paket filtreleme, durum tam denetimi), uygulama ağ geçitleri, ACL'ler.

Modern İletişim

VoIP, kablosuz LAN, Ağ Analizi ve Sniffing, Wireshark.

Sanallaştırma ve Bulut Teknolojileri

Sanallaştırma tanımları, sanallaştırma modelleri, terminolojiler, sanal modeller, sanal platformlar, bulut bilişim nedir, bulut temelleri, bulut hizmet modelleri, bulutta güvenlik ve gizlilik, çoklu kiracılık sorunları, altyapı ve veri güvenliği, gizlilik endişeleri.


3. Gün

Koruyucu İzleme

Güvenlik Bilgi Olay Yönetimi (SIEM) süreçleri ve mimarisi, SIEM özellikleri, kullanıcı etkinliği izleme, gerçek zamanlı olay korelasyonu, günlük saklama, dosya bütünlüğü izleme, güvenlik denetimi ve otomasyon denetimi, ne denetlenmeli, uygulama yönergeleri, ne toplanmalı, Windows Olay Günlüğü, UNIX Syslog, uygulama düzeyinde günlük kaydı, denetim izi analizi, veri analizi yaklaşımları.

Yaygın Saldırı Yöntemleri

Siber istismarlar, kötü amaçlı yazılımları anlama, çapraz site komut dosyası oluşturma, SQL Enjeksiyonu, DDOS, girdi doğrulama, arabellek taşması, hedefli saldırılar ve gelişmiş kalıcı tehditler (APT).

Şifreleme

Şifreleme teknolojisinin kullanım alanları, simetrik / asimetrik anahtar şifreleme, açık ve özel anahtarlar, zayıflıklar, şifre çözme, karma, dijital imzalar, PKI, sertifika yetkilileri, bekleyen ve aktarılan veriler, SSL.


4. Gün

Siber ve Yasal Çerçeve

Yasal çerçeve bağlamında mevzuat, gözetim zinciri, raporlama ve güvence. Veri Koruma Yasası (DPA 2018) ve AB Genel Veri Koruma Yönetmeliği'ne (GDPR) genel bakış.

Dijital Ayak İzleri

İnternet temelleri, alan adı sistemi, whois (Inc. çalışma örneği), Traceroute, İnternet analizi, arama motorları, kişiler ve şirketler hakkında bilgi bulma araçları, kullanıcı adı arama, e-posta arama, tek kullanımlık e-postalar, şifreler, internet toplulukları ve kültürü, derin web dizinleri ve sızıntı web siteleri.

Bilgi Güvencesi

Genel Bakış - Birleşik Krallık Bilgi Güvencesi için itici güçler, girişimler ve programlar, risk değerlendirmesine karşı risk yönetimi, risk bileşenleri.

Risk Yönetimi ve Risk Tedavisi

İş bağlamı ve risk yönetimi yaklaşımı, risk yönetimi yaşam döngüsü, risk yönetimini kim sağlar - yaşam döngüsünün neresinde, bağlamı anlama, yasal ve düzenleyici. Risk Tedavisi - Riskleri tedavi etme yollarının belirlenmesi, güvence elde etme yöntemleri, kalan riskin doğasının anlaşılması, kararları destekleyen kanıtların toplanması, risk yönetimi kararları.

Fiziksel Güvenlik

Fiziksel güvenlik - aydınlatma, CCTV, çit, izinsiz giriş tespiti, tarama, imha, UPS ve jeneratörler, erişim ve giriş kontrolü.

Personel Güvenliği

İnsanlar, çalışanlar, yükleniciler, müşteriler (kaynak, güvenlik açığı, tehdit), işe alım, tarama, Sosyal Mühendislik, Yaygın İnsan İstismarları, T&C'ler, rolde, rolde değişiklik, fesih, içeriden tehdit, tedarik zinciri zorlukları.


5. Gün

Hizmet Güvencesi ve Standartları

Güvence perspektifi - CPA, CAPS, FIPS, CE, Ortak Kriterler, SPF dahil. Yaygın endüstri standartlarının özeti. (OWASP, ISO27001, PCI-DSS gibi)

Yazılım Güvenliği Güvencesi

Yazılım güvenliği için ilkeler (en zayıf halkayı güvence altına alma, derinlemesine savunma, güvenli bir şekilde başarısız olma, en az ayrıcalık, ayrıcalıkların ayrılması), IA tasarım ilkeleri

Güvenli Geliştirme Süreci

Tasarımla Güvenli, Güvenli Geliştirme Yaşam Döngüsü (SDLC)

Tehdit Modellemesi

Tehdit modelleme nedir, tehdit modelleme süreçleri

STRIDE: Risk Azaltma

Risk azaltma seçenekleri

En İyi Güvenlik Uygulamaları

Saldırı yüzeyini azaltma, derinlemesine savunma, güvenliği test etme, zayıflıklar ve açıklar, güvenli kodlama, hatalardan ders çıkarma

Güvenlik Mimarisine Giriş 

Güvenlik tasarım mimarisi, kurumsal tasarım çerçeveleri (TOGAF, ZACHMAN, SABSA), kalıplar (NCSC, Açık Güvenlik Mimarisi)

Bilgi kontrolü, 4. - 5. gün teslimatına dayalı senaryo alıştırma soruları.

Day 1

Computing Foundation, Data Storage and Memory  
Computer system components, operating systems (Windows, Linux & Mac), different types of storage, file systems (FAT & NTFS), memory management.

OSI Protocol Stack
Switched networks, packet switching vs circuit switching, packet routing delivery, routing, internetworking standards, OSI model, and 7 layers.

TCP/IP
TCP/IP protocol suite, types of addresses, physical address, logical address, IPv4, IPv6, port address, specific address, network access control,

Day 2

Network Architecture
Network fundamentals, network types (advantages & disadvantages), WAN vs LAN, DHCP

Internet Primer
How does data travel across the internet? End to end examples for web browsing, send emails, using applications - explaining internet architecture, routing, DNS.

Network Security
Secure planning, policies and mechanisms, Active Directory structure, introducing Group Policy (containers, templates, GPO), security and network layers, IPSEC, SSL / TLS (flaws and comparisons) SSH, Firewalls (packet filtering, state full inspection), application gateways, ACL's.

Modern Communications
VoIP, wireless LAN, Network Analysis and Sniffing, Wireshark.

Virtualisation & Cloud Technologies
Virtualisation definitions, virtualisation models, terminologies, virtual models, virtual platforms, what is cloud computing, cloud essentials, cloud service models, security & privacy in the cloud, multi-tenancy issues, infrastructure vs data security, privacy concerns.

Day 3

Protective Monitoring
Security Information Event Management (SIEM) processes and architecture, SIEM features, user activity monitoring, real time event correlation, log retention, file integrity monitoring, security auditing & automation auditing, what to audit, implementation guidelines, what to collect, Windows Event Log, UNIX Syslog, logging at an application level, audit trail analysis, approaches to data analysis.

Common Methods of Attack
Cyber exploits, understanding malware, cross site scripting, SQL Injection, DDOS, input validation, buffer-overflow, targeted attacks and advanced persistent threats (APT).

Encryption
Uses of encryption technology, symmetric / asymmetric key encryption, public and private keys, weaknesses, decryption, hashing, digital signatures, PKI, certificates authorities, data at rest and in transit, SSL.

Day 4

Cyber and the Legal Framework
Legislation, chain of custody, reporting and assurance within the context of a legal framework. Inc. overview of Data Protection Act (DPA 2018) and the EU General Data Protection Regulation (GDPR).

Digital Footprints
Internet foundations, domain name system, whois (Inc. worked example), Traceroute, Internet analysis, search engines, Tools for finding information on people and companies, username searchers, email lookups, disposable emails, passwords, internet communities and culture, deep web directories and leaking websites.

Information Assurance
Overview - the drivers for UK Information Assurance, initiatives and programmes, risk assessment vs risk management, risk components.

Risk Management and Risk Treatment
Business context and risk management approach, risk management lifecycle, who delivers risk management - where in the lifecycle, understanding the context, legal and regulatory. Risk Treatment - Identify the ways of treating risks, methods of gaining assurance, understanding the nature of residual risk, collecting evidence that supports decisions, risk management decisions.

Physical Security
Physical security - lighting, CCTV, fencing, intrusion detection, screening, destruction, UPS and generators, access and control of entry.

Personnel Security
People, employees, contractors, customers (resource, vulnerability, threat), recruitment, screening, Social Engineering, Common People Exploits, T&C's, in role, change in role, termination, insider threat, supply chain challenges.

Day 5

Service Assurance & Standards
Assurance perspective – including CPA, CAPS, FIPS, CE, Common Criteria, SPF. Summary of common industry standards. (Inc. OWASP, ISO27001, PCI-DSS)

Software Security Assurance
Principles for software security, (securing the weakest link, defence in depth, failing securely, least privilege, separation of privilege), IA design principles

Secure Development Process
Secure by Design, Secure Development Life Cycle (SDLC)

Threat Modelling
What is threat modelling, threat modelling processes

STRIDE: Risk Mitigation
Risk mitigation options

Security Best Practice
Reduce the attack surface, defence in depth, test security, weaknesses and vulnerabilities, secure coding, learn from mistakes

Introduction to Security Architecture 
Security design architecture, enterprise design frameworks (TOGAF, ZACHMAN, SABSA), patterns (NCSC, Open Security Architecture)

Knowledge check, scenario exercise questions based upon days 4 - 5 delivery.

Exam Information

Independent APMG Examination sat on the final day of the class.

Candidates will receive individual emails to access their AMPG GCT candidate portal, typically available two weeks post exam. If you experience any issues, please contact the APMG GCT technical help desk on 01494 4520450.


Duration

60 minutes

Questions

50, multiple choice (4 multiple choice answers only 1 of which is correct)

Pass Mark

50%




Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Istanbul, London and Ankara facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

Classroom / Virtual Classroom
25 September 2023
Istanbul, Ankara, London
5 Days
Classroom / Virtual Classroom
02 October 2023
Istanbul, Ankara, London
5 Days
Classroom / Virtual Classroom
08 November 2023
Istanbul, Ankara, London
5 Days
Classroom / Virtual Classroom
13 November 2023
Istanbul, Ankara, London
5 Days
Classroom / Virtual Classroom
18 November 2023
Istanbul, Ankara, London
5 Days
Classroom / Virtual Classroom
22 November 2023
Istanbul, Ankara, London
5 Days
Classroom / Virtual Classroom
27 November 2023
Istanbul, Ankara, London
5 Days
Classroom / Virtual Classroom
04 December 2023
Istanbul, Ankara, London
5 Days
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.