Price: $2,499.00
Length: 3 Days
Print Friendly, PDF & Email

Cybersecurity Systems Engineering Training

Cybersecurity Systems Engineering Training Course Description

Cybersecurity systems engineering training provides you with an interdisciplinary approach of system engineering in order to achieve a secure information system in cyber world. Cybersecurity systems engineering training helps you to relate the cybersecurity problems to real world and apply systems engineering approach to satisfy the security of information technology.

Cybersecurity Systems Engineering Training

From the systems engineering point of view, information technology systems are purely engineering systems which include software and human operators as well a hardware. For this engineered type of information system, systems engineering approach helps the elements of cybersecurity system fit together to accomplish the objective of the whole. This unified objective is secure the information system from any unwanted threats or vulnerabilities. Therefore, the cybersecurity systems engineering training gives you an engineered point of view to tackle the cybersecurity issues.

Cybersecurity systems engineering training course covers variety of topics in cybersecurity systems engineering area such as: cybersecurity fundamentals, relationship between cybersecurity and systems engineering, cybersecurity threats and vulnerabilities, Malwares, and Cryptography as the system identification and exploration phase of systems engineering. Next, cyber security topics such as: information assurance, network security, web security, software/hardware security and cryptography are introduced as operation phase of systems engineering. The last phase of system engineering is risk assessment and maintenance where cybersecurity topics such as: incident response, disaster recovery plan and risk management are included.

Value Added of Cybersecurity Systems Engineering Training

  • Learn about different types of threats and vulnerabilities as the exploration part of systems engineering. Moreover, you will be introduced to malicious software in cybersecurity, examples of malware, and fundamentals of symmetric and public key cryptography.
  • Learn about the main concept of information assurance in cybersecurity which in systems engineering point of view will be design consideration and concept of operation. Moreover, network security, software/hardware security and web security topics are covered as another concepts of operation for systems engineering studies.
  • You will also learn about risk management in cybersecurity, disaster recovery, different types of disasters, incident response to handle vulnerabilities as the risk assessment and maintenance plan for systems engineering point of view.
  • Our instructors at TONEX will help you to master all the cybersecurity systems engineering design techniques by introducing the recent methods of risk management and information assurance techniques.
  • You will also learn about risk management in cybersecurity, disaster recovery, different types of disasters, incident response to handle vulnerabilities as the risk assessment and maintenance plan for systems engineering point of view.

Who Can Benefit from Cybersecurity Systems Engineering Training

If you are an IT professional who specialize in cybersecurity and need to validate your skills by systems engineering point of view, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the cybersecurity systems engineering training and will prepare yourself for your career.

TONEX Cybersecurity Systems Engineering Training Framework

Cybersecurity systems engineering training course by TONEX is interactive course with a lot of class discussions and exercises aiming to provide you a useful resource for cybersecurity systems engineering. This training mainly views the cybersecurity issues as a systems engineering problem and uses structural systems engineering approaches to identify and manage the risks.

Cybersecurity systems engineering training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you to tackle all the related cybersecurity challenges.

Audience

Cybersecurity systems engineering training is a 3-day course designed for:

  • IT professionals in the area of cybersecurity
  • Security testers looking to understand new engineering approaches of testing
  • Test analysts who are looking for technical training of cybersecurity systems
  • Project managers, quality managers, cybersecurity managers, business analysts or IT directors looking for a comprehensive training in cybersecurity systems engineering
  • Professionals who look for understanding cybersecurity issues from systems engineering point of view
  • Executives and managers of cybersecurity systems area
  • Information technology professionals, web engineers, security analysts, policy analysts
  • Investors and contractors who plan to make investments in cybersecurity industry.
  • Technicians, operators, and maintenance personnel who are or will be working on cybersecurity projects

Training Objectives

Upon completion of cybersecurity systems engineering training course, the attendees are able to:

  • Understand Fundamentals of cybersecurity systems
  • Describe the basics of systems engineering approaches to solve a problem
  • Relate the cybersecurity issues to systems engineering problem
  • Understand different types of threats and vulnerabilities in cybersecurity systems
  • Have a clear idea of malicious codes in cybersecurity
  • Conduct incident response, risk management, and risk assessment techniques to cybersecurity issues
  • Understand the security problems of networks, software/hardware and web systems
  • Learn the systematic systems engineering approach to tackle cybersecurity incidents
  • Relate the maintenance of systems engineering to risk management and incident response of cybersecurity

Training Outline

Cybersecurity systems engineering training course consists of the following lessons, which can be revised and tailored to the client’s need:

Fundamentals of Cybersecurity

  • Definition of Cyber security
  • Information security principles
  • System engineering approaches for Cyber security
  • Cyber world
  • Cyber space
  • Cyber domain
  • Cyber ecosystem
  • Cyber culture
  • Cyber environment
  • Cognitive layer of cyber world
  • Service layer of cyber world
  • Semantic layer in cyber world
  • Syntactic layer of cyber world
  • Physical layer of cyber world
  • Professional terms used in cyber security
  • concepts and approaches in cyber security
  • impact of legal issues in cyber security
  • online security resources
  • Basic security terminology
  • Microsoft security advisor

 Cybersecurity and Systems Engineering Approach

  • System Engineering Phases for Cybersecurity
  • Project Definition ( Threats and Vulnerabilities in Cybersecurity)
  • Exploration (Identifying Threats)
  • Concept of Operation ( Security in Cybersecurity)
  • Requirements and Architecture
  • Risk Assessment ( Risk Management)
  • Engineering Design ( Security Considerations)
  • Detailed Design
  • Implementation
  • Integration, Test and Verification
  • System Verification and Validation
  • Operation and Maintenance (Cybersecurity Protection)
  • Cybersecurity Threats and Need for System Engineering Approach
  • Stakeholder Analysis
  • Recovery Cost from Cyber Attack
  • Secure System Engineering Concept
  • Systems Analysis and Design
  • Concept of Operation for Information Technology
  • Building a Trusted Infrastructure with Classified Processes
  • Protection of Information Assets
  • Assessing System Architecture and Implementing control
  • System Developing Life Cycle
  • Security Architecture Metrics
  • Integrating the System and Verification of Performance
  • Data Continuity Pattern

Cybersecurity Threats and Vulnerabilities

  • Threats to be dangerous for the system security
  • Definition of threats
  • Different types of threats
  • System security in one term
  • Phishing and spear phishing
  • Malicious code
  • Weak and default passwords
  • Unpatched or outdated software vulnerabilities
  • Removable media

 Insider Threats in a Cybersecurity

  • Definition of insider threat
  • Location of insider threats on security agenda
  • Growing insider threats
  • Active directory and insider threats
  • Network management and compliance
  • Trends of insider activities
  • Enterprise-wide risk assessment for insiders threats
  • Insider threat awareness incorporation into security training
  • Enforcing policies and controls
  • Monitoring suspicious or disruptive behavior
  • Managing the negative issues regarding the insider threats
  • Strict password implementation
  • Recognizing the assets
  • Separation of duties and least privilege
  • Beating insider threats

 Malicious Software (Malware)

  • Definition of Malware
  • Malicious Software (Malware)
  • Malware effect to user’s device
  • Examples of Malwares
  • Computer virus
  • Boot sector virus
  • Excel micro virus
  • Word micro virus
  • Script viruses
  • Keyloggers
  • Password stealers
  • Backdoor Trojan
  • Crimeware
  • Spyware
  • Adware
  • Classification based on least threat results
  • Classification based on great threat results
  • Exploits
  • Rootkits
  • Trojans
  • Backdoors
  • Viruses
  • Worms
  • Email Worms
  • Networms
  • Legal usage of spyware
  • How to identify a spyware
  • Rootkit
  • Malicious web-based code
  • Logic bombs
  • Spam
  • Detecting viruses and spywares
  • Antivirus software
  • Antispyware software

 Cryptography

  • Introduction to Cryptography
  • Stream Ciphers
  • Block Ciphers
  • Symmetric (Private Key) Encryption
  • Asymmetric Encryption
  • Main Aspects of Cryptography
  • Public Key Encryption (PKI)
  • Hash Functions and Data Integrity
  • Digital Signature
  • GPG
  • Digital Certificate
  • Cryptographic Threats and Tools

Information Assurance in Cybersecurity

  • Why should we protect the network?
  • Concept of confidentiality
  • Concept of integrity in information assurance
  • Availability of information
  • Management process
  • Network protection
  • Risk management
  • Knowledge of your team
  • Personnel training for information assurance
  • Understanding the threat
  • Securing the system
  • Personal devices security
  • Common access card security
  • Continuity of operation plans
  • Facility disaster recovery plan
  • Information technology contingency plan
  • Incident response
  • Information assurance enforcement

 Network Security

  • The ISO/OSI reference model
  • Popular networks
  • UUCP
  • The language of the internet
  • Open design
  • TCP
  • UDP
  • Risk management; vital part of network security
  • Destructive behavior
  • Unauthorized access
  • Firewalls and network security
  • Hybrid system network security
  • Single point of failure in network
  • Secure modems/dial back system
  • Crypto-capable routers
  • Virtual private networks

 Software and Hardware Security

  • Computer Security Principle
  • Security Programming Techniques
  • Trusted Computing Infrastructure (TCI)
  • Low Level Software Security Attacks and Protection
  • Web Security
  • Secure Software Design Principles
  • Risk Management
  • Statistical Analysis
  • Symbolic Execution
  • Penetration Testing
  • Cloud Security
  • Data Security and Privacy (DAP)
  • Wireless Network Security
  • Mobile System Security
  • Hardware Cryptography
  • Basics of VLSI
  • Counterfeit Detection
  • Hardware Metering
  • Fault Injection Attacks in Hardware
  • Physical Hardware Attacks
  • Secure Hardware Design for FPGAs
  • Embedded System Security
  • Security of Radio Frequency Identification (RFID)
  • Hardware Trojans
  • Crypto Processor Design

Web Security

  • Overview of Web Security
  • HTTP Protocol
  • Basic Cryptography
  • SSL Protocol
  • Web Attacks
  • Browser Security
  • Cookies, Web Bugs
  • Spywares
  • Windows System Security
  • Unix/Linux Server Security
  • Apache and IIS Web Servers
  • Various Access Controls
  • Packet Filtering and Web Firewall
  • Introduction to Computer Networks

Risk Management Technology

  • History of risk management
  • Maintaining confidentiality of data
  • Assurance of the integrity of data
  • Revising the deployment organization to manage the risk
  • Insurances to cover the risks
  • Disaster recovery plan (DRP)
  • Incident response plans (IRP)
  • Business continuity plan (BCP)
  • Handling the action points
  • Evaluation, assessment, and maintenance of risk control
  • Risk control cycle
  • Risk Control layers
  • Preventive and detective controls
  • Cost Benefit Analysis (CBA)
  • Asset valuation components
  • Risk management discussion points
  • Risk management practices
  • Risk identification
  • Analyzing the source of the risk
  • Risk assessment
  • Severity of risk impact
  • Likelihood of risk occurring
  • Controllability of risks
  • Risk response development
  • Developing the risk management strategy
  • Contingency plan development
  • Risk response control
  • Implementing risk strategy
  • Monitoring plan for new risks
  • Risk management modification

 Disaster Recovery and Business Continuity

  • Types of disasters
  • Establishing a need for disaster recovery
  • Principles of disaster recovery and business continuity
  • Disaster recovery and business continuity program
  • Defining processes necessary for disaster recovery
  • Risk assessment
  • Performing risk assessment and audits
  • Risk assessment application
  • Business impact analysis application
  • Developing the business impact analysis
  • Developing business continuity and recovery strategies
  • Awareness, testing and training of disaster recovery plan
  • Testing Flow charts
  • Commence training programs for disaster recovery
  • Maintenance of disaster recovery plan
  • Monitoring of disaster recovery plan
  • Implementation of disaster recovery plan
  • Business continuity management
  • Business resumption plan
  • Planning for business continuity
  • Objectives of business continuity
  • International Organization for Standardization (ISO)
  • Crisis management
  • Resource development
  • Business continuity Management (BCM) vs. disaster recovery
  • The importance of a BCMS
  • Overview of ISO 22301

 Incident Response

  • Types of incidents
  • Viruses
  • Accidents
  • Hacker intrusion
  • Fire
  • Denial of Service
  • Theft property information
  • Incident response and business continuity planning
  • Business continuity recovery terms
  • Incident Management Team (IMT)
  • Incident Response Team (IRT)
  • Preparation for IRP
  • Identification of incident
  • Limiting incidents
  • Analysis and eradication of incidents
  • Incident recovery
  • Ex-Post response
  • Incident detection technologies
  • Logs to collect and monitor incidents
  • IT detect incidents
  • Employee’s response
  • Chain of Custody law
  • Containment
  • Incident handling response
  • Incident management metrics

 Hands On, Workshops, and Group Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops and Labs for Cybersecurity systems engineering Training

  • How to Identify Threats and Vulnerabilities in an IT Infrastructure
  • Align Threats and Vulnerabilities to the Risk Management Controls
  • Contingency plans and workarounds
  • Risk evaluation
  • Perform a Qualitative Risk Assessment for an IT Infrastructure
  • Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) documents
  • Analyzing malicious Adobe PDF documents
  • Recognizing malware
  • Interacting with malicious websites to examine their nature
  • SQL Injection Workshop
  • Introduction to Vulnerable Software
  • Hash Generation and Sensitivity of Hash Functions
  • RSA Signature
  • Risk Assessment Case Study
  • Risk Management Tools
  • Recovery Plan Training from Disaster Incident Resposne

Cybersecurity Systems Engineering Training

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.