• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

This hands-on course provides participants with a high-level overview of various aspects of Cybersecurity in the context of a modern and Internet-connected environment. Through lecture, hands-on exercises, and group discussion, you will gain a foundational perspective on the challenges of designing a cybersecurity program, implementing secure systems, and other factors needed for a comprehensive cybersecurity solution.

Upon completion of this course, each participant will be able to define cybersecurity terminology, compliance requirements, review sample attacks, and gain an understanding of the impact of current threat trends on cybersecurity implementation.

Learning Objectives

Module 1: Introduction to Cybersecurity

  • Define cybersecurity
  • Know basic cybersecurity terminology
  • Identify the primary cybersecurity threats from cyberwar, cyber terror, and cybercrime
  • Identify specific cybersecurity threats to the Federal government and DOD
  • Apply learned concepts to identify threats in a threat exercise

Module 2: Cybersecurity Laws, Regulations and Standards

  • Know cybersecurity laws
  • Know cybersecurity regulations
  • Know security standards
  • Identify legal challenges to cybersecurity

Module 3: Designing with Cybersecurity in Mind

  • Define defense in depth
  • Identify critical technologies to support cybersecurity defense in depth
  • Know the principles and use of offensive cybersecurity
  • Apply concepts in a defense in depth exercise

Module 4: Managing Cybersecurity

  • Know the components of good cybersecurity management
  • Identify the elements of cybersecurity governance
  • Define critical elements of cybersecurity policy and procedures
  • Know the relationship of cybersecurity and the system development life cycle
  • Identify and list critical cybersecurity metrics
  • Review the requirements for cybersecurity education, training and awareness

Module 5: Special Cybersecurity Topics

  • Know the elements of IT Contingency Planning
  • Identify cybersecurity incidents and the requirements for investigations
  • Define the requirements for privacy and the protection of personal information
  • Know the concepts of cybersecurity ethics
  • Analyze the requirements in a cybersecurity exercise

Framework Connections