The objective of the course is to provide a comprehensive but necessarily high-level overview across industry standard technology and platforms, illuminating the technology and its specific cyber governance, risk, and assurance challenges, including artificial intelligence (AI) adoption, without technically challenging the learner to hands-on labs.
On the first day the course takes the learner back to computer basics to build the individuals understanding common technology platforms through to the network layer and on via virtualisation technologies, cloud systems, telecoms and modern communications and insight into the world of protective monitoring, challenges and issues of security events logs and analysis.
Common methods of attack. Providing the learner with an insight into many of the most popular attack vectors today.
The third day will start the benefits and pitfalls of encryption. Then covering cyber law and the context in which security practitioners and organisations must operate within. Each of us has a digital footprint and the technology we use within our enterprise as an attack surface. The next module joins these two principles and explains the challenges for assurance around leaky data.
During the remainder of day four and five we introduce the layered cyber concepts and the deeper governance required throughout the entire lifecycle covering several specialist areas essential to the rounded security practitioner.
Each day provides insight into the technical subject matter with the crucial security subtext. Knowledge check exercises, where delegates work in groups to discuss and provide solutions to scenarios offering an explanation with a rationale in each instance of why this is important from a security assurance perspective. Learners will also have the opportunity to take part in a real-time ransomware response scenario exercise, ideal as a capstone event to help consolidate learning.
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
Day 1
Module 1 Computing Foundation, Data Storage and Memory
Module 2 Network Computing
Module 3 Network Communications - TCP/IP protocol suite,
Module 4 Internet Primer
Day 2
Module 5 Network Security
Module 6 Modern Communications
Module 7 Virtualisation & Cloud Technologies
Module 8 Protective Monitoring (Security Information Event Management SIEM)
Module 9 Common Methods of Attack
CyberFish DoJo Ransomware response scenario
Day 3
Module 10 Encryption
Module 11 Cyber and the Legal Framework
Module 12 Digital Footprints
Module 13 Information Assurance
Day 4
Module 14 Risk Management and Risk Treatment
Module 15 Physical Security
Module 16 Personnel Security
Module 17 Service Assurance & Standards
Day 5
Module 18 Software Security Assurance
Module 19 Secure Development Process
Module 20 Threat Modelling and STRIDE
Module 21 Introduction to Security Architecture
Module 22 Security Best Practice
Exam Information
Candidates will receive individual emails to access their APMG candidate portal, typically available two weeks post exam.
Knowledge Check – Quiz
End of module knowledge check – exam style questions
Duration 50 Minutes
Questions 50, multiple choice (4 multiple choice answers only 1 of which is correct)
Pass Mark 50%
Join our public courses in our Russia facilities. Private class trainings will be organized at the location of your preference, according to your schedule.
B. Ö. - BT & İş Çözümleri Müdürü
TotalEnergies
Rated the training 5 stars.
S. G. - Business Solutions Specialist
TotalEnergies
Rated the training 5 stars.
H. A. - İŞ Çözümleri Koordinatorü
TotalEnergies
Rated the training 5 stars.
Ç. V. S. - IT-BS SAP
TotalEnergies
Rated the training 5 stars.
K. D. - OT Specialist
TÜPRAŞ
Rated the training 5 stars.
R. A. - Operasyonel Teknolojiler Mühendisi
Tüpraş
Rated the training 5 stars.
E. A. - Bilgisayar Tekniker
TÜPRAŞ
Rated the training 5 stars.
İ. Ç. - Bt Şefi
TÜPRAŞ
Rated the training 5 stars.
M. Ö. - IT çözüm ortaği
TÜPRAŞ
Rated the training 5 stars.
Ç. Ç. - IT Team Leader
TÜPRAŞ
Rated the training 5 stars.
G. Y. - Operasyonel Teknolojiler Kıdemli Çözüm Ortağı
TÜPRAŞ
Rated the training 5 stars.
U. K. - OT Çözüm Ortağı
TÜPRAŞ
Rated the training 5 stars.
M. U. - Operasyonel Teknolojiler Mühendisi
TÜPRAŞ
Rated the training 5 stars.
N. D. Y. - Mühendis
TÜPRAŞ
Rated the training 5 stars.
C. D. - OT Mühenidisi
TÜPRAŞ
Rated the training 5 stars.
F. E. - Bilgisayar Teknikeri
TÜPRAŞ
Rated the training 5 stars.
S. G. - Bilgisayar Teknikeri
TÜPRAŞ
Rated the training 5 stars.
M. Y. A. - Bilgisayar Operatörü
TÜPRAŞ
Rated the training 5 stars.
M. E. Y. - Bilgisayar Operatörü
TÜPRAŞ
Rated the training 5 stars.
T. T. - Operasyonel Teknolojiler Uzmanı
TÜPRAŞ
Rated the training 5 stars.
H. D. - İnformation Technology Expert
TÜPRAŞ
Rated the training 5 stars.
S. Y. - Destek Uzmanı
TÜPRAŞ
Rated the training 5 stars.
Ö. F. O. - Operasyonel Tek. Çözüm Ortağı
TÜPRAŞ
Rated the training 5 stars.