Cybersecurity Compliance Framework & System Administration – 8H121G

Course Name:

Cybersecurity Compliance Framework & System Administration


Skill Level:



WBT – Web Based Training


1.625 Day/s

Request Quote


This course gives you the background needed to understand the key cybersecurity compliance and industry standards, server administration, endpoint security, patching and CR – Classroom Trainingyptography.

This course provides the basic commands for user and server administration as it relates to security. You will need this skill to be able to understand vulnerabilities within your organizations operating systems.You will learn the concepts of endpoint security and patch management. Both of these topics are important to keep systems current to avoid cybersecurity incidents against an organization.Finally, you will learn in-depth skills around CR – Classroom Trainingyptography and enCR – Classroom Trainingyption to understand how these concepts affect software within a company.This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the third course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.

Enroll here

Please enable JavaScript in your browser to complete this form.
Multiple Choice
How did you hear about us?
Yes, I would like to receive special offers from CRS.
Yes, I would like to receive special offers from CRS.

Target Audience:

This course is intended for anyone who wants to gain a basic understanding of Security Frameworks, Compliance, endpoint management, enCR – Classroom Trainingyption or CR – Classroom Trainingyptography or as the third course in a series of courses to gain the skills needed as a Jr Cybersecurity analyst.





Unit 1 -Compliance Frameworks and Industry Standards

Unit 2 – Client System Administration, Endpoint protection and Patching

Unit 3 – Server and User Administration

Unit 4 – CR – Classroom Trainingyptography and Compliance Pitfalls


In this course, you will learn to:

  • Define events, attacks, and incidents in the context of cybersecurity
  • DesCR – Classroom Trainingibe the cybersecurity challenges that organizations face that require compliance and regulation
  • Contrast security, privacy, and compliance in the context of cybersecurity
  • DesCR – Classroom Trainingibe the specific checklist of security controls
  • Discuss the two main categories of cybersecurity compliance
  • Explain each step of the typical process for verifying cybersecurity compliance
  • DesCR – Classroom Trainingibe the Computer Fraud and Abuse Act
  • Summarize what the National Institute of Standards and Technology (NIST) does
  • DesCR – Classroom Trainingibe the requirements for privacy and data protection contained in the General Data Protection Regulation (GDPR)
  • Summarize basic aspects of the International Organization for Standardization (ISO) 27001 standard
  • Explain the purpose and benefits of System and Organizational Controls (SOC) reports
  • Contrast SOC 1, SOC 2, and SOC 3 reports
  • Differentiate between Type 1 and Type 2 SOC reports
  • Discuss typical Trust Service Principles used to define a SOC 2 report’s scope
  • DesCR – Classroom Trainingibe the CR – Classroom Trainingiteria used in a SOC audit
  • Summarize the importance of continuous monitoring between cybersecurity compliance audits
  • Explain why organizations in and outside the U.S. comply with the Health Insurance Portability and Accountability Act (HIPAA)
  • Define covered entity, business associate, and protected health information (PHI) in the context of HIPAA
  • DesCR – Classroom Trainingibe HIPAA’s Privacy Rule and Security Rule
  • Explain the Payment Card Industry Data Security Standard (PCI DSS), including its goals, scope, and audit process
  • DesCR – Classroom Trainingibe some of the PCI DSS’s most unique requirements
  • DesCR – Classroom Trainingibe the Center for Internet Security (CIS) CR – Classroom Trainingitical Security Controls®, including control types and implementation groups
  • Define a client in the context of a computer network
  • Discuss essential characteristics of client system administration in the context of cybersecurity
  • DesCR – Classroom Trainingibe common types of endpoint attacks
  • Define endpoint protection
  • Explain key characteristics of endpoint protection
  • DesCR – Classroom Trainingibe unified endpoint management (UEM)
  • Explain what endpoint protection and response (EDR) does
  • Summarize useful features of endpoint protection and response (EDR) applications
  • Discuss important considerations for evaluating an endpoint security solution
  • Manage endpoints using Xcitium OpenEDR
  • Summarize key developments in device management that have made UEM a popular approach to endpoint protection
  • Define patching
  • Explain why patching is essential for protecting against cybersecurity threats
  • Differentiate the four types of Windows updates
  • Explain why patching applications is essential for cybersecurity
  • Summarize the typical patching process that most organizations use
  • DesCR – Classroom Trainingibe patch management best practices
  • Compare and contrast Windows’s two modes: user and kernel
  • Define file system and hierarchical structure
  • Contrast the NTFS and FAT file systems that Windows uses
  • DesCR – Classroom Trainingibe the Windows directory structure
  • Summarize how Windows handles the separation of 32-bit and 64-bit applications
  • Explain how authentication and authorization work in Windows Access Control
  • Define Windows privileged accounts
  • DesCR – Classroom Trainingibe the principle of least privilege and its benefits for network administration
  • Define local user accounts within Windows
  • DesCR – Classroom Trainingibe default local accounts within Windows
  • Discuss security considerations for managing local Windows systems
  • DesCR – Classroom Trainingibe features of the Windows Security app
  • Explain how Active Directory works
  • DesCR – Classroom Trainingibe key features of Active Directory
  • Differentiate the four types of Active Directory accounts
  • Summarize guidelines for restricting and protecting sensitive domain accounts using Active Directory
  • DesCR – Classroom Trainingibe the two types of Active Directory groups
  • Explain scope as it relates to Active Directory groups
  • Summarize what makes Windows Admin Center useful for server management
  • Define Kerberos authentication and desCR – Classroom Trainingibe its benefits for Windows security and compliance
  • DesCR – Classroom Trainingibe server logs in the context of network administration
  • Discuss how to locate and view Windows Server logs
  • Explain why an organization should have a security auditing policy
  • DesCR – Classroom Trainingibe the nine types of Windows security events that administrators can audit
  • Summarize why organizations use Linux
  • Explain what the Linux kernel and shell do
  • DesCR – Classroom Trainingibe Linux’s file system and directory structure
  • Explain what happens at each Linux run level
  • DesCR – Classroom Trainingibe common shell choices within Linux
  • Recall the functions of basic Linux shell commands
  • Explain how to install and set up Samba so that Linux and Windows systems can communicate over a network
  • Explain why organizations use CR – Classroom Trainingyptography and enCR – Classroom Trainingyption
  • DesCR – Classroom Trainingibe the Open Web Application Security Project (OWASP) Top 10 Project and the SANS Institute Top 25 Software Errors
  • Define enCR – Classroom Trainingyption
  • Contrast symmetric and public key CR – Classroom Trainingyptography
  • Define CR – Classroom Trainingyptographic terms, including hash functions and digital signatures
  • DesCR – Classroom Trainingibe common CR – Classroom Trainingyptography pitfalls and recommended solutions
  • DesCR – Classroom Trainingibe best practices for enCR – Classroom Trainingypting data at rest
  • Explain the recommended method for enCR – Classroom Trainingypting data in use
  • DesCR – Classroom Trainingibe pitfalls and best practices for enCR – Classroom Trainingypting data in transit
  • Explain the purpose of using hashing
  • Discuss common pitfalls of using hashing
  • DesCR – Classroom Trainingibe additional considerations when using hashing
  • Explain how message authentication codes (MACs) work with hashing to ensure integrity
  • List recommended uses for digital signatures
  • Explain how to safeguard enCR – Classroom Trainingyption keys
  • DesCR – Classroom Trainingibe recommended ways to secure a key enCR – Classroom Trainingyption key (KEK)
  • EnCR – Classroom Trainingypt and deCR – Classroom Trainingypt files using cCR – Classroom Trainingypt
  • DesCR – Classroom Trainingibe the OpenPGP protocol
  • EnCR – Classroom Trainingypt and deCR – Classroom Trainingypt emails using Mailvelope
  • Summarize the impacts of quantum computing on CR – Classroom Trainingyptography
  • Set up user and group accounts in Kali Linux
  • EnCR – Classroom Trainingypt a file using cCR – Classroom Trainingypt
  • CR – Classroom Trainingeate an enCR – Classroom Trainingypted email using Mailvelope
  • Evaluate your peers’ completion of Linux and enCR – Classroom Trainingyption tasks using the provided rubric




Product Name:

IBM Security Education

Badge and Certification Info:


Cybersecurity Compliance Framework & System Administration Fundamentals

https://www.CR – Classroom

https://images.CR – Classroom



IBM Security

Follow on Courses:



Replaced By:

8H121;8H120;8H110;cyber;security;cybersecurity;system analyst

Lab Access Duration:


CRS is the top Global Training Provider for some of the world’s biggest brands.

Call Now +27 12 023 1959