Course Outline
Foundations of Cybersecurity
-
Identify the essential skills and knowledge required to become a cybersecurity analyst for government operations.
-
Evaluate how security breaches can affect business and governmental operations.
-
Explain the principles of security ethics in the context of public sector responsibilities.
-
Identify common tools utilized by cybersecurity analysts for government tasks.
Play It Safe: Manage Security Risks
-
Identify the primary threats, risks, and vulnerabilities to business and governmental operations.
-
Examine how organizations implement security frameworks and controls to safeguard their operations for government purposes.
-
Define commonly used Security Information and Event Management (SIEM) tools in the public sector.
-
Utilize a playbook to effectively respond to threats, risks, and vulnerabilities in governmental contexts.
Connect and Protect: Networks and Network Security
-
Define the various types of networks and their components for government use.
-
Illustrate how data is transmitted and received over a network in governmental systems.
-
Understand methods to secure networks against intrusion tactics for government operations.
-
Describe system hardening techniques applicable to public sector environments.
Tools of the Trade: Linux and SQL
-
Explain the relationship between operating systems, applications, and hardware for government IT infrastructure.
-
Compare a graphical user interface to a command line interface in the context of public sector computing.
-
Navigate and manage the file system using Linux commands via the Bash shell for government tasks.
-
Use SQL to extract information from databases for government operations.
Assets, Threats, and Vulnerabilities
-
Classify assets within the context of public sector operations.
-
Analyze an attack surface to identify risks and vulnerabilities for government systems.
-
Identify threats, such as social engineering, malware, and web-based exploits in governmental contexts.
-
Summarize the threat modeling process for government applications.
Sound the Alarm: Detection and Response
-
Identify the steps to contain, eradicate, and recover from an incident in governmental settings.
-
Analyze packets to interpret network communications for government security.
-
Understand basic syntax, components of signatures, and logs in Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools for government use.
-
Perform queries in Security Information and Event Management (SIEM) tools to investigate an event for government purposes.
Automate Cybersecurity Tasks with Python
-
Explain how the Python programming language is utilized in cybersecurity for government operations.
-
Create new, user-defined Python functions for governmental tasks.
-
Use regular expressions to extract information from text in a governmental context.
-
Practice debugging code for government cybersecurity applications.
Put It to Work: Prepare for Cybersecurity Jobs
-
Determine when and how to escalate a security incident in governmental settings.
-
Engage with the cybersecurity community, particularly those focused on public sector issues.
-
Find and apply for cybersecurity jobs within government agencies.
-
Prepare for job interviews in the governmental cybersecurity field.
Requirements
- No specific degree or prior experience is required for government positions in this category.
Testimonials (3)
The final day which is the Machine Learning Topic
John Erick Baltazar - Globe Telecom
Course - Google BigQuery
It was a really good training course, well prepared and explained by the trainer with great hands on experience on GCP.
Mircea
Course - Google Cloud Platform Basics and Management
Responses with solutions and practical use.