Course details
Whether you are a cyber security professional, or an IT professional tasked to manage your business's IT infrastructure, NICF - Cyber Security Operations Specialist centres on equipping you and your team with the right skillsets and competencies to keep an organisation secure - not just in head-based knowledge, but in operational proficiency.
Specifically, NICF CSOC focuses on the cognitive and analytical abilities of participants, in addition to knowledge. NICF CSOS' emphasis is on equipping participants with cyber defence operational skillsets - that will be ingrained in individuals on a day-to-day basis.
COURSE FOCUS
Real-World, Operations-Centric
Cyber Defence Training
- State-of-the-Art Cyber Training Platform
- Emulation of real-world conditions such as network structure, network characteristics, and traffic, with real malware and exploits.
- True and accurate reflection of what it would be like to experience the entire kill-chain of cyber-attack(s) in a controlled environment
- First in Singapore and the region
COURSE STRUCTURE
Day 1
Cyber Security Imperatives
- Cyber threats, trends, terms and terminologies
- CIA, AAA, standards, audit, compliance and regulations
- Cryptography and applications
Network Technologies and Security
- Introduction to network systems, types and devices
- Secure network protocol (SSL/TLS, SSH)
- Introduction to network security devices (Firewall, IPS/IDS, SIEM, etc.)
Server Systems and Logs
- Types and functions of servers (web, database, mail, AD, etc.)
- OS, servers and their event logs (Windows, Linux,IIS, Apache, Mssql, sendmail and etc.)
Day 2
Attack Methodology and Types
- Attack phases
- Types of vulnerabilities and attacks
- Web-based attack (OWASP top 10)
Security Operations Centre and Incident Response
- Different types of information security incident
- Information security incident management framework
- Overview to SOC concepts and operations
- Threat identification, threat correlation, threat aggregation, threat filtering (through applications and server logs)
- Incident handling, response management, notification and reporting
Security Products and Hands-On
- Checkpoint Firewall, Security Information and Event Management(SIEM)
- Monitoring tools such as Wireshark, Process Monitor
Day 3-5
Security Operations Centre Cyber-Attack Scenario-based Exercises
- Exposure to real-world cyber-attack scenarios
- Developing detection, and response skills through team-based exercises
Course Location
About ITBM
Instructional & Courseware Design
- Customized CD Learning, e-Learning and Courseware for companies. Find out more now.
Office Workflow Automation
- When running your day-to-day business, you realise that things can be made easier for you if the system is computerised. But how do you get started? More information here.