Overview
- The Level 3 Cyber Security Technician Qualification has been developed to train people to provide first-line cyber security support.
 - This requires individuals to monitor and detect potential security threats and escalate as necessary.
 - An employee in this occupation will be responsible for supporting a cybersecurity function (frequently a Security Operations Centre or Network Operations Centre) working under supervision.
 - The employee will be conducting specific cyber security tasks to defined procedures and standards.
 
Objective
- Follow information security procedures
 - Maintain information security controls
 - Develop information security training and awareness resources
 - Monitor the effectiveness of information security training and awareness
 - Handle and assess the validity of security requests from a range of internal and external stakeholders
 - Follow technical procedures to install and maintain technical security controls
 - Monitor and report information security events
 - Recognize when and how to escalate information security events in accordance with relevant procedures and standards
 - Review and modify access rights to digital information systems, services, devices, or data
 - Maintain an inventory of digital information systems, services, devices, and data storage
 - Scopes cyber security vulnerability assessments
 - Evaluate the results of a cyber security vulnerability assessment
 - Perform routine threat intelligence gathering tasks through consulting external sources
 - Undertake digital information risk assessments
 - Identify and categorize threats, vulnerabilities, and risks in preparation for response or escalation
 - Document cyber security event information whilst preserving evidence
 - Draft information management reports using standard formats appropriate to the recipients
 - Review and comment upon cyber security policies, procedures, standards, and guidelines
 - Perform cyber security compliance checks
 - Translate audit requirements and collate relevant information from log files, incident reports, and other data sources
 - Communication skills to co-operate as part of a multi-functional, multi-disciplinary team using a range of technical and non-technical language to provide an effective interface between internal or external users and suppliers
 - Keep up-to-date with legislation and industry standards related to the implementation of cyber security in an organization
 
The Main Topic of the Course
- Understand Cyber Security Principles
 - Understand Threat Intelligence in Cyber Security
 - Cyber Security Testing, Vulnerabilities and Controls
 - Cyber Security Incident Response
 - Understand legislation and ethical conduct within cyber security
 - Professional Skills and Behaviors for Cyber Security
 - Network Principles, Networking Devices,
 - Core terminology and Cyber Awareness
 - Compliance and Policy
 - Vulnerabilities and Threats
 - Threat Identification and Events
 - Forensic principles and Incidents
 - Detecting and Reporting
 - Risk Assessment and Asset Control
 - Disaster Prevention
 
Who is it For?
- Any (IT staff ) who are candidates for roles for Cyber Security Technicians like :
 - Cyber Security Administrator,
 - Access Control Administrator,
 - Incident Response Technician, Junior Security
 - Junior Operations Centre (SOC),
 - Junior Penetration Tester,
 
Benefits
- preparing for CompTIA Security Plus
 
Course Outlines and Training Plan
1st Module “ Introduction to cyber security “
- Course Introduction
 - Overview of cyber security
 - fill the gap between trainees’ knowledge regarding cybersecurity
 - Security roles in the organization
 - Security certificate level
 
2nd Module “ threat, attack, vulnerability “
- Malware type
 - Understating attack
 - Threat intelligence
 - Social engineering attack
 - Common attack
 - Understating vulnerability type
 - Vulnerability scanning
 - Penetration testing and bug bounty
 
3rd Module OWASP
- 10 top OWASP
 
4th Module “ cryptography “
- Encryption
 - Symmetric cryptography
 - A Symmetric cryptography
 - Key management
 - PKI Public Key Infrastructure
 - Cryptanalytic attack
 - Cryptographic application
 
5th Module “ Identity Access Management IAM“
- Identification
 - Authentication
 - Authorization
 - Account management
 
6th Module “physical security and cloud security “
- Data center protection
 - Hardware and data security
 - Business continuity management BCM
 - Disaster recovery plan DRP
 - Cloud computing
 - Virtualization
 
7th Module “ Endpoint Security “
- Host security
 - Hardware security
 - Configuration management
 - Embedded devices security
 - Working on the command line
 
8th Module “ network security “
- OSI
 - TCP/IP
 - Secure network design
 - Network security devices
 - Network security techniques
 - Wireless network
 - Network attack
 - Network tools
 - Mobile device security
 
9th Module “ operation and incident response “
• Incidence response program
• Attack Framework
• Incidence investigation
• Forensic techniques
10th Module “ GRC governance Risk & Compliance “
- Risk analysis
 - Risk management framework
 - Supply chain
 - Security policy
 - Privacy and Compliance
 - Security training and awareness
 
					
			
    
    
    
    