Price: $2,499.00

Length: 3 Days
Print Friendly, PDF & Email

Cybersecurity Systems Engineering Training

cybersecurity-systems-engineering-training-tonex-image

The cybersecurity systems engineering field is just now receiving the attention it deserves given the continual barrage of cyber-attacks on protected data.

Cybersecurity systems engineering is all about preventing and/or resolving cybersecurity issues. Many analysts believe the realm of cybersecurity systems engineering has been vastly overlooked or underdeveloped in addressing cybersecurity risks and vulnerabilities among industrial control systems and other Internet of Things networks and devices.

When systems were predominantly hardware-based, components were built to specification. Systems engineers defined and verified component functions and interfaces that together provided total system capability.

Today, system capability is largely supplied through software components and network connectivity. This increases the system’s flexibility and adaptability along with its cyber risk.

Software components are specified loosely, if at all, and are often assembled from an opaque mix of modified legacy components, commercial off-the-shelf (COTS) applications and services, and open source libraries downloaded from the internet.

This greatly increases the cyber-attack surface. Using cybersecurity engineering knowledge, methods, and tools throughout the lifecycle of software-intensive systems will reduce their inherent cyber risk and increase their operational cyber resilience.

Cybersecurity has a software/data/information component and may have, but most likely does not have, a hardware/device component. Cybersecurity systems engineers apply probability, statistics and cryptographic topics, specialized math and engineering topics. They analyze and design complex devices which are likely to have hardware, software and human components.

The expected tasks and activities of cybersecurity systems engineers are related on where they work and the types of systems and networks they are responsible for protecting.

Cybersecurity systems engineers incorporate electrical engineering and computer science to understand cyberspace. They use skills developed in digital forensics, security policy and network defense to perform cybersecurity tasks, as well as work on engineering hardware and software.

A well-trained cybersecurity systems engineer can go a long way in  protecting businesses from unauthorized access to sensitive data through cyber-attacks.

Cybersecurity systems engineering can be deployed in several ways. For industries like banking, healthcare and utilities with high cyberattack risks, the best shield is a proactive engineering design of physical systems with cybersecurity incorporated from the beginning of system development.

In other words, using the systems engineer’s technical expertise to help create cyber resilient systems is essential

Cybersecurity Systems Engineering Training Course by Tonex

Cybersecurity systems engineering training provides you with an interdisciplinary approach of system engineering in order to achieve a secure information system in cyber world. Cybersecurity systems engineering training helps you to relate the cybersecurity problems to the real world and to apply a systems engineering approach to satisfy the security of information technology.

 

From the systems engineering point of view, information technology systems are purely engineering systems which include software and human operators as well a hardware. For this engineered type of information system, a systems engineering approach helps the elements of a cybersecurity system fit together to accomplish the objective of the whole. This unified objective is to secure the information system from any unwanted threats or vulnerabilities. Therefore, the cybersecurity systems engineering training gives you an engineered point of view to tackle the cybersecurity issues.

Our Cybersecurity Systems Engineering Training course covers a variety of topics in cybersecurity systems engineering area such as: cybersecurity fundamentals, relationship between cybersecurity and systems engineering, cybersecurity threats and vulnerabilities, Malwares, and Cryptography as the system identification and exploration phase of systems engineering. Next, cybersecurity topics such as information assurance, network security, web security, software/hardware security and cryptography are introduced as the operation phase of systems engineering. The last phase of system engineering is risk assessment and maintenance where cybersecurity topics such as incident response, disaster recovery plan and risk management are included.

Value Added of Cybersecurity Systems Engineering Training

  • Learn about different types of threats and vulnerabilities as the exploration part of systems engineering. Moreover, you will be introduced to malicious software in cybersecurity, examples of malware, and fundamentals of symmetric and public key cryptography.
  • Learn about the main concept of information assurance in cybersecurity, which in systems engineering point of view will be design consideration and concept of operation. Moreover, network security, software/hardware security and web security topics are covered as another concepts of operation for systems engineering studies.
  • You will also learn about risk management in cybersecurity, disaster recovery, different types of disasters, incident response to handle vulnerabilities as the risk assessment and maintenance plan for systems engineering point of view.
  • Our instructors at Tonex will help you to master all the cybersecurity systems engineering design techniques by introducing the recent methods of risk management and information assurance techniques.

Who Can Benefit from Cybersecurity Systems Engineering Training

If you are an IT professional who specialize in cybersecurity and need to validate your skills from a systems engineering point of view, you will benefit from the presentations, examples, case studies, discussions, and individual activities upon the completion of the cybersecurity systems engineering training and will prepare yourself for your career.

Tonex Cybersecurity Systems Engineering Training Framework

Cybersecurity systems engineering training course by Tonex is an interactive course with a lot of class discussions and exercises aiming to provide you a useful resource for cybersecurity systems engineering. This training mainly views the cybersecurity issues as a systems engineering problem and uses structural systems engineering approaches to identify and manage the risks.

Cybersecurity systems engineering training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you to tackle all the related cybersecurity challenges.

Audience

Cybersecurity systems engineering training is a 3-day course designed for:

  • IT professionals in the area of cybersecurity
  • Security testers looking to understand new engineering approaches of testing
  • Test analysts who are looking for technical training of cybersecurity systems
  • Project managers, quality managers, cybersecurity managers, business analysts or IT directors looking for a comprehensive training in cybersecurity systems engineering
  • Professionals who look for understanding cybersecurity issues from a systems engineering point of view
  • Executives and managers of cybersecurity systems area
  • Information technology professionals, web engineers, security analysts, policy analysts
  • Investors and contractors who plan to make investments in cybersecurity industry.
  • Technicians, operators, and maintenance personnel who are or will be working on cybersecurity projects

Training Objectives

Upon completion of the Cybersecurity Systems Engineering Training course, attendees are able to:

  • Understand Fundamentals of cybersecurity systems
  • Describe the basics of systems engineering approaches to solve a problem
  • Relate the cybersecurity issues to systems engineering problem
  • Understand different types of threats and vulnerabilities in cybersecurity systems
  • Have a clear idea of malicious codes in cybersecurity
  • Conduct incident response, risk management, and risk assessment techniques to cybersecurity issues
  • Understand the security problems of networks, software/hardware and web systems
  • Learn the systematic systems engineering approach to tackle cybersecurity incidents
  • Relate the maintenance of systems engineering to risk management and incident response of cybersecurity

Training Outline

Cybersecurity systems engineering training course consists of the following lessons, which can be revised and tailored to the client’s need:

Fundamentals of Cybersecurity

  • Definition of Cybersecurity
  • Information security principles
  • System engineering approaches for Cybersecurity
  • Cyber world
  • Cyber space
  • Cyber domain
  • Cyber ecosystem
  • Cyber culture
  • Cyber environment
  • Cognitive layer of cyber world
  • Service layer of cyber world
  • Semantic layer in cyber world
  • Syntactic layer of cyber world
  • Physical layer of cyber world
  • Professional terms used in cybersecurity
  • Concepts and approaches in cybersecurity
  • Impact of legal issues in cyber security
  • Online security resources
  • Basic security terminology
  • Microsoft security adviser

 Cybersecurity and Systems Engineering Approach

  • System Engineering Phases for Cybersecurity
  • Project Definition ( Threats and Vulnerabilities in Cybersecurity)
  • Exploration (Identifying Threats)
  • Concept of Operation ( Security in Cybersecurity)
  • Requirements and Architecture
  • Risk Assessment ( Risk Management)
  • Engineering Design ( Security Considerations)
  • Detailed Design
  • Implementation
  • Integration, Test and Verification
  • System Verification and Validation
  • Operation and Maintenance (Cybersecurity Protection)
  • Cybersecurity Threats and Need for System Engineering Approach
  • Stakeholder Analysis
  • Recovery Cost from Cyber Attack
  • Secure System Engineering Concept
  • Systems Analysis and Design
  • Concept of Operation for Information Technology
  • Building a Trusted Infrastructure with Classified Processes
  • Protection of Information Assets
  • Assessing System Architecture and Implementing control
  • System Developing Life Cycle
  • Security Architecture Metrics
  • Integrating the System and Verification of Performance
  • Data Continuity Pattern

Cybersecurity Threats and Vulnerabilities

  • Threats to be dangerous for the system security
  • Definition of threats
  • Different types of threats
  • System security in one term
  • Phishing and spear phishing
  • Malicious code
  • Weak and default passwords
  • Unpatched or outdated software vulnerabilities
  • Removable media

 Insider Threats in a Cybersecurity

  • Definition of insider threat
  • Location of insider threats on security agenda
  • Growing insider threats
  • Active directory and insider threats
  • Network management and compliance
  • Trends of insider activities
  • Enterprise-wide risk assessment for insiders threats
  • Insider threat awareness incorporation into security training
  • Enforcing policies and controls
  • Monitoring suspicious or disruptive behavior
  • Managing the negative issues regarding the insider threats
  • Strict password implementation
  • Recognizing the assets
  • Separation of duties and least privilege
  • Beating insider threats

 Malicious Software (Malware)

  • Definition of Malware
  • Malicious Software (Malware)
  • Malware effect to user’s device
  • Examples of Malwares
  • Computer virus
  • Boot sector virus
  • Excel micro virus
  • Word micro virus
  • Script viruses
  • Keyloggers
  • Password stealers
  • Backdoor Trojan
  • Crimeware
  • Spyware
  • Adware
  • Classification based on least threat results
  • Classification based on great threat results
  • Exploits
  • Rootkits
  • Trojans
  • Backdoors
  • Viruses
  • Worms
  • Email Worms
  • Networms
  • Legal usage of spyware
  • How to identify a spyware
  • Rootkit
  • Malicious web-based code
  • Logic bombs
  • Spam
  • Detecting viruses and spywares
  • Antivirus software
  • Antispyware software

 Cryptography

  • Introduction to Cryptography
  • Stream Ciphers
  • Block Ciphers
  • Symmetric (Private Key) Encryption
  • Asymmetric Encryption
  • Main Aspects of Cryptography
  • Public Key Encryption (PKI)
  • Hash Functions and Data Integrity
  • Digital Signature
  • GPG
  • Digital Certificate
  • Cryptographic Threats and Tools

Information Assurance in Cybersecurity

  • Why should we protect the network?
  • Concept of confidentiality
  • Concept of integrity in information assurance
  • Availability of information
  • Management process
  • Network protection
  • Risk management
  • Knowledge of your team
  • Personnel training for information assurance
  • Understanding the threat
  • Securing the system
  • Personal devices security
  • Common access card security
  • Continuity of operation plans
  • Facility disaster recovery plan
  • Information technology contingency plan
  • Incident response
  • Information assurance enforcement

 Network Security

  • The ISO/OSI reference model
  • Popular networks
  • UUCP
  • The language of the internet
  • Open design
  • TCP
  • UDP
  • Risk management; vital part of network security
  • Destructive behavior
  • Unauthorized access
  • Firewalls and network security
  • Hybrid system network security
  • Single point of failure in network
  • Secure modems/dial back system
  • Crypto-capable routers
  • Virtual private networks

 Software and Hardware Security

  • Computer Security Principle
  • Security Programming Techniques
  • Trusted Computing Infrastructure (TCI)
  • Low Level Software Security Attacks and Protection
  • Web Security
  • Secure Software Design Principles
  • Risk Management
  • Statistical Analysis
  • Symbolic Execution
  • Penetration Testing
  • Cloud Security
  • Data Security and Privacy (DAP)
  • Wireless Network Security
  • Mobile System Security
  • Hardware Cryptography
  • Basics of VLSI
  • Counterfeit Detection
  • Hardware Metering
  • Fault Injection Attacks in Hardware
  • Physical Hardware Attacks
  • Secure Hardware Design for FPGAs
  • Embedded System Security
  • Security of Radio Frequency Identification (RFID)
  • Hardware Trojans
  • Crypto Processor Design

Web Security

  • Overview of Web Security
  • HTTP Protocol
  • Basic Cryptography
  • SSL Protocol
  • Web Attacks
  • Browser Security
  • Cookies, Web Bugs
  • Spywares
  • Windows System Security
  • Unix/Linux Server Security
  • Apache and IIS Web Servers
  • Various Access Controls
  • Packet Filtering and Web Firewall
  • Introduction to Computer Networks

Risk Management Technology

  • History of risk management
  • Maintaining confidentiality of data
  • Assurance of the integrity of data
  • Revising the deployment organization to manage the risk
  • Insurances to cover the risks
  • Disaster recovery plan (DRP)
  • Incident response plans (IRP)
  • Business continuity plan (BCP)
  • Handling the action points
  • Evaluation, assessment, and maintenance of risk control
  • Risk control cycle
  • Risk Control layers
  • Preventive and detective controls
  • Cost Benefit Analysis (CBA)
  • Asset valuation components
  • Risk management discussion points
  • Risk management practices
  • Risk identification
  • Analyzing the source of the risk
  • Risk assessment
  • Severity of risk impact
  • Likelihood of risk occurring
  • Controllability of risks
  • Risk response development
  • Developing the risk management strategy
  • Contingency plan development
  • Risk response control
  • Implementing risk strategy
  • Monitoring plan for new risks
  • Risk management modification

 Disaster Recovery and Business Continuity

  • Types of disasters
  • Establishing a need for disaster recovery
  • Principles of disaster recovery and business continuity
  • Disaster recovery and business continuity program
  • Defining processes necessary for disaster recovery
  • Risk assessment
  • Performing risk assessment and audits
  • Risk assessment application
  • Business impact analysis application
  • Developing the business impact analysis
  • Developing business continuity and recovery strategies
  • Awareness, testing and training of disaster recovery plan
  • Testing Flow charts
  • Commence training programs for disaster recovery
  • Maintenance of disaster recovery plan
  • Monitoring of disaster recovery plan
  • Implementation of disaster recovery plan
  • Business continuity management
  • Business resumption plan
  • Planning for business continuity
  • Objectives of business continuity
  • International Organization for Standardization (ISO)
  • Crisis management
  • Resource development
  • Business continuity Management (BCM) vs. disaster recovery
  • The importance of a BCMS
  • Overview of ISO 22301

 Incident Response

  • Types of incidents
  • Viruses
  • Accidents
  • Hacker intrusion
  • Fire
  • Denial of Service
  • Theft property information
  • Incident response and business continuity planning
  • Business continuity recovery terms
  • Incident Management Team (IMT)
  • Incident Response Team (IRT)
  • Preparation for IRP
  • Identification of incident
  • Limiting incidents
  • Analysis and eradication of incidents
  • Incident recovery
  • Ex-Post response
  • Incident detection technologies
  • Logs to collect and monitor incidents
  • IT detect incidents
  • Employee’s response
  • Chain of Custody law
  • Containment
  • Incident handling response
  • Incident management metrics

 Hands On, Workshops, and Group Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops and Labs for Cybersecurity systems engineering Training

  • How to Identify Threats and Vulnerabilities in an IT Infrastructure
  • Align Threats and Vulnerabilities to the Risk Management Controls
  • Contingency plans and workarounds
  • Risk evaluation
  • Perform a Qualitative Risk Assessment for an IT Infrastructure
  • Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) documents
  • Analyzing malicious Adobe PDF documents
  • Recognizing malware
  • Interacting with malicious websites to examine their nature
  • SQL Injection Workshop
  • Introduction to Vulnerable Software
  • Hash Generation and Sensitivity of Hash Functions
  • RSA Signature
  • Risk Assessment Case Study
  • Risk Management Tools
  • Recovery Plan Training from Disaster Incident Response

Cybersecurity Systems Engineering Training

 

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.