×
Phoenix TS

Introduction to Cyber Security for Practitioners Training

This 3-day, instructor-led training addresses the basics of networking, cybercrime, various security concepts, and how to address common security concerns within your organization.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

This training course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

  • Explain the concepts of information systems security as applied to an IT infrastructure
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure
  • Explain the role of access controls in implementing a security policy
  • Explain the role of operations and administration in effective implementation of security policy
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems
  • Explain how businesses apply cryptography in maintaining information security
  • Analyze the importance of network principles and architecture to security operations
  • Explain the means attackers use to compromise systems and networks and defenses used by organizations
  • Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector

Course Outline

The Need for Information Systems

  • Information systems security
  • The Internet of Things is changing how we live
  • Malicious attacks, threats, and vulnerabilities
  • Drivers of the information Security business

Securing Today’s Information Systems

  • Access controls
  • Security operations and administration
  • Auditing, testing, and monitoring
  • Risk, response, and recovery
  • Cryptography
  • Networks and telecommunications
  • Malicious code and activity

Information Security Standards, Education, Certifications, and Laws

  • Information security standards
  • Information systems security education and training  
  • Information Security Professional Certifications  
  • U.S. compliance laws

FAQs

Who should take this course?

This course is intended for IT security professionals who want to establish a career in cyber security.

What is the recommended experience for this course?

Students should have minimal experience in the IT field, specifically in IT security; and an understanding of networking concepts and best security practices.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)