Overview:
The world is undergoing significant digital‐transformations, drastically changing the way we conduct business and carry out daily transactions. Cybersecurity assures the proper operation of everything from financial transactions to power generation, affects every size and scale of business, government, and everyday lives. It has become increasingly critical in the cyber-age.
Cyber-attacks can be extremely expensive, and cost lives, fortunes, and the future of nations.
Attacks are getting more sophisticated, more frequent, and reaching more people around the world.
That makes it important for you and everyone else to become aware of the effects of cybersecurity issues.
COURSE CURRICULUM:
Module-1: Basics of Cybersecurity:
- Basic issues & implications
- What to do about them?
- How the business works, Duty to protect
- Risk-management, Security-management
- Control-architecture, and Technical security-architecture
- Decision-Process
- Cyber-Lab Sample
- Quiz
Module-2: Dimensions of Cybersecurity:
- Critical-Infrastructure
- IT Versus OT
- Management Versus Technology
- Quiz
Module-3: Vertical Drill-downs, Case-studies:
- Medical-Healthcare Case Study
- Water Case Study
- City-power and Tribal-investments case-study
- City Government Case Study
- Banking & Financial Services
- Cyber Board Game Startup Case Study
- Quiz
Module-4: Global Perspectives from Guest lecturers:
- Chris Blask: Organizing-Cybersecurity
- Dr. Jennifer Bayuk: Risk-Analysis
- Prof. Lucina Duranti: Records Management
- Quiz
PROGRAM DELIVERY:
- Online remote with automated and semi-automated assistance
- Lectures via video from a cloud LMS platform
- Live Laboratory examples and experiments from the Cyber Labs
- Exams live online remote
- Total of around 45-60 hours, over 8 weeks (Can change depending on your background, schedule, etc.)
OUTCOME / BENEFITS:
- Learn from a world‐class expert instructor, who first coined the term “computer virus” and invented the virus defense techniques, who is an (ISC)² Fellow with over 40 years of experience in the cybersecurity industry and academia
- Receive a Certificate upon successfully completing the course
- Hands‐on‐experience: Access iZen’s Innovation Lab during the course. Use lab exercises to reinforce the understanding of concepts. Learn from real-life use‐cases
INSTRUCTOR: Dr. Fred Cohen
Dr. Cohen has a long history of being ahead of the curve. Following are some of the highlights of his accomplishments:
- First defined the term "Computer Virus" and invented most of the widely used computer virus defense techniques
- Won several international awards for his work in Cybersecurity
- Led the team that defined the information assurance problem as it relates to Critical-Infrastructure Protection
- Did seminal researcher in the use of deception for information protection
- His "Deception for Protection" series of papers is widely cited, and the techniques he pioneered are now in global use
- A leader in advancing the science of digital forensic evidence examination
- Top-flight information protection consultant and industry analyst for many years
- Authored more than 200 invited, refereed, and other scientific and management research articles
- Wrote monthly articles on cyber since 1995 and wrote several books on information protection
- His "Enterprise Information Protection Architecture", "Challenges to Digital Forensic Evidence", and "Digital Forensic Evidence Examination" are used in graduate classes and other venues worldwide
- Leading security practitioners around the globe have used his "Chief Information Security Officers ToolKit" series of books and booklets
- His "Frauds Spies and Lies and How to Defeat Them" book has been the subject of radio talk shows
- The research community has widely used his series of "Infosec Baseline" studies as stepping off points for further research
- His "50 Ways" series is very popular among practitioners looking for issues to be addressed
- His "World War 3 ... Information Warfare Basics" is highly regarded among the thinkers in this arena
- Founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program
- Taught and testified on issues of digital forensics as an admitted expert in local, State, Federal, and other courts in criminal and civil matters
- Was named the "most famous hacker" of all time by ABC news in 2009
Dr. Cohen has a Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie‐Mellon University).
- Teacher: Fred Cohen
The world is undergoing significant digital‐transformations, drastically changing the way we conduct business and carry out daily transactions. Cybersecurity assures the proper operation of everything from financial transactions to power generation, affects every size and scale of business, government, and everyday lives. It has become increasingly critical in the cyber-age.
Cyber-attacks can be extremely expensive, and cost lives, fortunes, and the future of nations.
Attacks are getting more sophisticated, more frequent, and reaching more people around the world.
That makes it important for you and everyone else to become aware of the effects of cybersecurity issues.
COURSE CURRICULUM:
Module-1: Basics of network operations and mechanisms:
- Physical and logical layers
- Protocols and IP, Sniffing, TCP, UDP, DNS
- How does the traffic flow?
- Governance, Flow of traffic and SMTP
- Live Lab-exercises, and Quiz
Module-2: Basics of network attack methods:
- Components, and attack mechanisms
- Attacker objectives, capabilities
- Attacker methods and mechanisms
- Defender's viewpoints and objectives
- Attack methodologies
- Starting position and attack progression
- Passive and active attack tools
- Design basis threat
- Live Lab-exercises and Quiz
Module-3: Basics of network attack detection mechanisms:
- The magnitude of the problem
- Attacks on Vs. through networks
- Detecting known attack sequences
- Live Lab-exercises and Quiz
Module-4: Automated detection tools, operational methodologies:
- A general approach to detection
- Loss of accountability
- Detection and response in a NOC
- Live Lab-exercises and Quiz
PROGRAM DELIVERY:
- Online remote with automated and semi-automated assistance
- Lectures via video from a cloud LMS platform
- Live Laboratory examples and experiments from the Cyber Labs
- Exams live online remote
- Total of around 75 hours, over 8 weeks (Can change depending on your background, schedule, etc.)
OUTCOME / BENEFITS:
Learn from a world‐class expert instructor, who first coined the term “computer virus” and invented the virus defense techniques, who is an (ISC)² Fellow with over 40 years of experience in the cybersecurity industry and academia
- Receive a Certificate upon successfully completing the course
- Hands‐on‐experience: Access iZen’s Innovation Lab during the course. Use lab exercises to reinforce the understanding of concepts. Learn by carrying out real-life use‐cases
- This is an “Outcome-based training” with a focus on employability. Courses are designed to prepare you for employment opportunities. For example, a certificate in “Network Attacks Detection” offers you the opportunity to work at a Network Operations Center. There are over 400,000 jobs currently open in the cybersecurity field, in the US alone, and similar demands exist in the rest of the world
INSTRUCTOR: Dr. Fred Cohen
Dr. Cohen has a long history of being ahead of the curve. Following are some of the highlights of his accomplishments:
- First defined the term "Computer Virus" and invented most of the widely used computer virus defense techniques
- Won several international awards for his work in Cybersecurity
- Led the team that defined the information assurance problem as it relates to critical infrastructure protection
- Did seminal researcher in the use of deception for information protection
- His "Deception for Protection" series of papers is widely cited, and the techniques he pioneered are now in global use
- A leader in advancing the science of digital forensic evidence examination
- Top-flight information protection consultant and industry analyst for many years
- Authored more than 200 invited, refereed, and other scientific and management research articles
- Wrote monthly articles on cyber since 1995 and wrote several books on information protection
- His "Enterprise Information Protection Architecture", "Challenges to Digital Forensic Evidence", and "Digital Forensic Evidence Examination" are used in graduate classes and other venues worldwide
- Leading security practitioners around the globe have used his "Chief Information Security Officers ToolKit" series of books and booklets
- His "Frauds Spies and Lies and How to Defeat Them" book has been the subject of radio talk shows
- The research community has widely used his series of "Infosec Baseline" studies as stepping off points for further research
- His "50 Ways" series is very popular among practitioners looking for issues to be addressed
- His "World War 3 ... Information Warfare Basics" is highly regarded among the thinkers in this arena
- Founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program
- Taught and testified on issues of digital forensics as an admitted expert in local, State, Federal, and other courts in criminal and civil matters
- Was named the "most famous hacker" of all time by ABC news in 2009
Dr. Cohen has a Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie‐Mellon University).
- Teacher: Fred Cohen
This course provides the framework that enables trusted data to flow through a service-oriented system. The framework is known as Trust Architecture.
An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.
This course helps to understand how protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organisations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organisational measures.
This course is aimed primarily at auditors, both internal and external, who are beginning their career in Computer Auditing or who wish to understand the complexities and vulnerabilities of computer systems. The course helps one to get leverage you need to move up in your career.
CISA is a standard certification for those who audit, control, monitor and assess the organization's IT and Business systems.