Porhai Eung is a Network Engineer and ICT security who enjoys both learning and sharing his knowledge with others. With over 7 years of experience in Internet Service Provider (ISP), Banking, Payment and Education industry, Porhai Eung has added many achievements to his name both national and international.
Foundational knowledge and essential skills for all cybersecurity domains including information security, systems security, network security, ethics and laws, and defense and mitigation techniques use
Duration: 45 Hours
Schedule: Weekend Afternoon (14:00 - 17:00)
Location: Online
Cybersecurity
1.1 The Cybersecurity World
1.2 Cyber Criminals versus Cybersecurity Specialists
1.3 Common Threats
1.4 Spreading Cybersecurity Threats
1.5 Creating More Experts
The Cybersecurity Cube
2.1 The Three Dimensions of the Cybersecurity Cube
2.2 CIA Triad
2.3 States of Data
2.4 Cybersecurity Countermeasures
2.5 IT Security Management Framework
3. Cybersecurity Threats, Vulnerabilities and Attacks
3.1 Malware and Malicious Code
3.2 Deception
3.3 Attacks
The Art of Protecting Secrets
4.1 Cryptography
4.2 Access Controls
4.3 Obscuring Data
The Art of Ensuring Integrity
5.1 Types of Data Integrity Controls
5.2 Digital Signatures
5.3 Certificates
5.4 Database Integrity Enforcement
The Five Nines Concept
6.2 Measures to Improve Availability
6.3 Incident Response
6.4 Disaster Recovery
Protecting a Cybersecurity Domain
7.1 Defending Systems and Devices
7.2 Server Hardening
7.3 Network Hardening
7.4 Physical and Environmental Security
Becoming a Cybersecurity Specialist
8.1 Cybersecurity Domains
8.2 Understanding the Ethics of Working in Cybersecurity
8.3 Next Step