Cybersecurity Compliance Framework & System Administration

Cybersecurity Compliance Framework & System Administration

 

IBM Training for Cybersecurity Compliance Framework & System Administration

Skill Level: Basic

Modality:  WBT - Web Based Training - Self Paced

Duration: 1.7 Day/s

Starting Price:  $ - 408

Overview:

This course gives you the background needed to understand the key cybersecurity compliance and industry standards, server administration, endpoint security, patching and cryptography.

This course provides the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.You will learn the concepts of endpoint security and patch management. Both of these topics are important to keep systems current to avoid cybersecurity incidents against an organization. Finally, you will learn in-depth skills around cryptography and encryption to understand how these concepts affect software within a company. This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the third course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.


Request a Quote

Please enable JavaScript in your browser to complete this form.
Email
Multiple Choice
How did you hear about us?
Yes, I would like to receive special offers from CRS.
Yes, I would like to receive special offers from CRS.


Target Audience:

This course is intended for anyone who wants to gain a basic understanding of security frameworks, compliance, endpoint management, encryption or cryptography or as the third course in a series of courses to gain the skills needed as a junior cybersecurity analyst..

.

Prerequisites: None.

Topic: Unit 1 -Compliance Frameworks and Industry StandardsUnit 2 - Client System Administration, Endpoint protection and PatchingUnit 3 - Server and User AdministrationUnit 4 - Cryptography and Compliance Pitfalls.

IBM Training

Objective: What you can do upon completion of this course:Define events, attacks, and incidents in the context of cybersecurity

  • Describe the cybersecurity challenges that organizations face that require compliance and regulation
  • Contrast security, privacy, and compliance in the context of cybersecurity
  • Describe the specific checklist of security controls
  • Discuss the two main categories of cybersecurity compliance
  • Explain each step of the typical process for verifying cybersecurity compliance
  • Describe the Computer Fraud and Abuse Act
  • Summarize what the National Institute of Standards and Technology (NIST) does
  • Describe the requirements for privacy and data protection contained in the General Data Protection Regulation (GDPR)
  • Summarize basic aspects of the International Organization for Standardization (ISO) 27001 standard
  • Explain the purpose and benefits of System and Organizational Controls (SOC) reports
  • Contrast SOC 1, SOC 2, and SOC 3 reports
  • Differentiate between Type 1 and Type 2 SOC reports
  • Discuss typical Trust Service Principles used to define a SOC 2 report‚Äôs scope
  • Describe the criteria used in a SOC audit
  • Summarize the importance of continuous monitoring between cybersecurity compliance audits
  • Explain why organizations in and outside the U.S. comply with the Health Insurance Portability and Accountability Act (HIPAA)
  • Define covered entity, business associate, and protected health information (PHI) in the context of HIPAA
  • Describe the HIPAA Privacy Rule and Security Rule
  • Explain the Payment Card Industry Data Security Standard (PCI DSS), including its goals, scope, and audit process
  • Describe some of the most unique requirements of PCI DSS
  • Describe the Center for Internet Security (CIS) Critical Security Controls¬ģ, including control types and implementation groups
  • Define a client in the context of a computer network
  • Discuss essential characteristics of client system administration in the context of cybersecurity
  • Describe common types of endpoint attacks
  • Define endpoint protection
  • Explain key characteristics of endpoint protection
  • Describe unified endpoint management (UEM)
  • Explain what endpoint protection and response (EDR) does
  • Summarize useful features of endpoint protection and response (EDR) applications
  • Discuss important considerations for evaluating an endpoint security solution
  • Manage endpoints using Xcitium OpenEDR
  • Summarize key developments in device management that have made UEM a popular approach to endpoint protection
  • Define patching
  • Explain why patching is essential for protecting against cybersecurity threats
  • Differentiate the four types of Windows updates
  • Explain why patching applications is essential for cybersecurity
  • Summarize the typical patching process that most organizations use
  • Describe patch management best practices
  • Compare and contrast two modes of Windows: user and kernel
  • Define file system and hierarchical structure
  • Contrast the NTFS and FAT file systems that Windows uses
  • Describe the Windows directory structure
  • Summarize how Windows handles the separation of 32-bit and 64-bit applications
  • Explain how authentication and authorization work in Windows Access Control
  • Define Windows privileged accounts
  • Describe the principle of least privilege and its benefits for network administration
  • Define local user accounts within Windows
  • Describe default local accounts within Windows
  • Discuss security considerations for managing local Windows systems
  • Describe features of the Windows Security app
  • Explain how Active Directory works
  • Describe key features of Active Directory
  • Differentiate the four types of Active Directory accounts
  • Summarize guidelines for restricting and protecting sensitive domain accounts using Active Directory
  • Describe the two types of Active Directory groups
  • Explain scope as it relates to Active Directory groups
  • Summarize what makes Windows Admin Center useful for server management
  • Define Kerberos authentication and describe its benefits for Windows security and compliance
  • Describe server logs in the context of network administration
  • Discuss how to locate and view Windows Server logs
  • Explain why an organization should have a security auditing policy
  • Describe the nine types of Windows security events that administrators can audit
  • Summarize why organizations use Linux
  • Explain what the Linux kernel and shell do
  • Describe Linux file system and directory structure
  • Explain what happens at each Linux run level
  • Describe common shell choices within Linux
  • Recall the functions of basic Linux shell commands
  • Explain how to install and set up Samba so that Linux and Windows systems can communicate over a network
  • Explain why organizations use cryptography and encryption
  • Describe the Open Web Application Security Project (OWASP) Top 10 Project and the SANS Institute Top 25 Software Errors
  • Define encryption
  • Contrast symmetric and public key cryptography
  • Define cryptographic terms, including hash functions and digital signatures
  • Describe common cryptography pitfalls and recommended solutions
  • Describe best practices for encrypting data at rest
  • Explain the recommended method for encrypting data in use
  • Describe pitfalls and best practices for encrypting data in transit
  • Explain the purpose of using hashing
  • Discuss common pitfalls of using hashing
  • Describe additional considerations when using hashing
  • Explain how message authentication codes (MACs) work with hashing to ensure integrity
  • List recommended uses for digital signatures
  • Explain how to safeguard encryption keys
  • Describe recommended ways to secure a key encryption key (KEK)
  • Encrypt and decrypt files using ccrypt
  • Describe the OpenPGP protocol
  • Encrypt and decrypt emails using Mailvelope
  • Summarize the impacts of quantum computing on cryptography
  • Set up user and group accounts in Kali Linux
  • Create an encrypted email using Mailvelope
  • Evaluate your peers‚Äô completion of Linux and encryption tasks using the provided rubric
  • Category: Security

     

    Product Name:

    IBM Security Education

     

    Badge and Certification Info:

    Badge Title: Cybersecurity Compliance Framework & System Administration Fundamentals

    Badge ID: 8a9e28d9-62fb-4bfb-a130-ea29fd45f634

     

    Brand: IBM Security

     

    IBM Training is available now.

    Cyber Retaliator Solutions (CRS) is a Cyber Security Distributor, Authorized IBM Training Center, Red Hat and SUSE Training Partner, and a CompTIA Training Delivery Partner, operating throughout the Globe. Our Head Office is in Centurion South Africa, with IBM Training Centers in Centurion, Midrand, Sandton, Cape Town, California CA, Florida FL, New York NY, Washington DC, Georgia GA, Texas TX.

     

    CRS is the Top Global Training Provider for some of the world's biggest brands.

    Authorized Training delivered to you by the global leader in IBM Training.

     

    Select courses in:

    IBM Cloud

    DataPower

    IBM Automation

    IBM Rational

    Watson

    IBM Tivoli

    IBM Systems

    Cognos

    IBM Storage

    Mainframe

    IBM Security

    System Z

    IBM Industry

    IBM Asset Management

    Websphere

    IBM Data and AI

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

    Authorized IBM Training

    RedHat Training

    SUSE Training

    Agile SAFe Training

    Cyber Awareness Training

    Cyber Security

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

     

    Authorized IBM Training
    RedHat Training
    SUSE Training
    Cyber Awareness Training
    Agile SAFe Training
    Cyber Security

     

     

    CRS offers

    IBM Training

    and

    IBM Certification Training

    across

    The United States of America

    with locations:

    4700 Millenia Blvd., Orlando, Florida 32839

    250 Park Avenue, New York, New York 10177

    4900 California Avenue, Tower B, Bakersfield, California 93309

    1300 I Street NW, Washington, District of Columbia 20005

    235 W Roosevelt Ave, Albany, Georgia 31701

    4400 Buffalo Gap Rd., Abilene, Texas 79606

     

     

    Follow CRS:

     

    Follow on Courses:

    Replaced By: 

    8H121 8H120 8H110 cyber security cybersecurity system analyst

    The price on this page are indicative. Please contact CRS via the above form to confirm pricing.

    Call Now +27 12 023 1959