ISO/IEC 27032 is the international standard for improving cybersecurity, addressing also other IT-security-related domains such as information security, network security, internet security, and critical information infrastructure protection (CIIP). This course provides the foundational security practices for people and organizations working in the Cyberspace. It equips participants with the capability of working in secure IT infrastructure and cyber environments, ensuring that their day-to-day activities are compliant with an international best practice standard for cyber and IT security.
-
Course Objectives
-
Upon completion of this course, participants will have a full understanding of the following:
• The foundational base practices for achieving and maintaining cyber and IT security, based on an international standard.
• Cybersecurity considerations for IT networks, computer systems, applications and databases, and the cloud.
• Vulnerabilities, risks, and required measures in the cyberspace and related IT infrastructure.
• Relevant cryptography and identity and access management controls that support cybersecurity.
• The different types of hackers and how to identify them.
• Tools that cybercriminals use and the steps they take to exploit vulnerabilities.
-
Capabilities Acquired
-
By obtaining this certification, participants will be able to demonstrate they have developed the following capabilities:
• Effectively work in a secure IT infrastructure and cyber environment, adhering to international best practices.
• Anticipate to cyber and IT security threats, contributing to risk management by reducing vulnerabilities.
• Pursue any further specialization in technical information security.
-
Audience
-
Anyone working in an IT organization.
-
Syllabus
-
1. Introduction to IT Infrastructure and Cybersecurity
2. Security in IT Networks
3. Security in Computer Systems
4. Security in Applications and Databases
5. Cryptography Practices and Controls
6. Identity and Access Management Practices and Controls
7. Cloud Computing Service Models and Risks
8. Threats and Attacks for Exploiting Vulnerabilities
-
Exam Details
-
• Duration: 60 minutes
• Questions: 40, multiple-choice
• Passing score: 65%
• Format: Paper, closed-book, online proctored
• Prerequisites: None