Western Canada
Information Security
Conference

May 16, 2017


CSX Cybersecurity Fundamentals Workshop

 

 

Location: RBC Winnipeg Convention Centre – Meeting Room 3 East

Date: May 17th and 18th

Length: 2 Days

Seats Available: 30

Register Here

Pricing:

Early Bird (Before March 17th, 2017)

ISACA Members Non-Members
CSX Cybersecurity Fundamental Workshop Only CDN $350.00 CDN $700.00
WCISC and CSX Cybersecurity Fundamental Workshop CDN $475.00 CDN $825.00

 

Standard (After March 17th, 2017)

ISACA Members Non-Members
CSX Cybersecurity Fundamental Workshop Only CDN $400.00 CDN $800.00
WCISC and CSX Cybersecurity Fundamental Workshop CDN $550.00 CDN $950.00

 

Note: All pricing include the two day workshop, all meals included (Breakfast, Lunch and snacks), the CSX Cybersecurity Fundamental Study Guide, and the CSX Cybersecurity Fundamental exam that can be taken in a later date selected by the attendees of the workshop.

 

Level: Beginner – intermediate

 

Target audience:

  • Zero to three years cybersecurity experience.
  • Audit, risk, compliance, information security, government and legal professionals with a familiarity of basic IT/IS concepts who:
    • are new to cybersecurity
    • are interested in entering the field of cybersecurity
    • are interested in the ISACA Cybersecurity Fundamentals Certificate
  • This workshop would be appropriate for students and recent graduates

 

Workshop Description:

The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field, and it is crucial that the central concepts that frame and define this increasingly pervasive field are understood by professionals who are involved and concerned with the security implications of Information Technologies (IT).

 

The CSX Fundamental Workshop is designed for this purpose, as well as to provide insight into the importance of cybersecurity, and the integral role of cybersecurity professionals. This workshop will also cover four key areas of cybersecurity:

  1. Cybersecurity architecture principles
  2. Security of networks, systems, applications and data
  3. Incident response
  4. The security implications of the adoption of emerging technologies

 

Designed as a foundational workshop, it will also prepare learners for the CSX Cybersecurity Fundamentals Certificate Exam.

 

Learning Objectives:

After completing this workshop, you will be able to:

  • Understand basic cybersecurity concepts and definitions
  • Identify Cybersecurity roles
  • Understand basic security architecture principles
  • Understand malware analysis concepts
  • Recognize the techniques for detecting host-and-network-based intrusions via intrusion detection technologies
  • Understand vulnerability assessment management
  • Recognize penetration testing phases
  • Understand high level network security, including remote access technology and systems administration concepts
  • Understand system hardening and virtualization
  • Recognize system lifecycle management principles
  • Review the OWASP top ten
  • Differentiate between events and incidents
  • Define types of incidents and identify elements of an incident response plan
  • Be aware of the basic procedures for processing digital forensic data
  • Recognize new and emerging information technology, and identity the associated security implications

 

Workshop Outline:

  1. Cybersecurity Introduction & Overview
    1. Introduction to Cybersecurity
    2. Difference between Information Security & Cybersecurity
    3. Cybersecurity objectives
    4. Cybersecurity roles
  2. Cybersecurity Concepts
    1. Risk
    2. Common attack types & vectors
    3. Policies & procedures
    4. Cybersecurity controls
  3. Security Architecture Principles
    1. What is security architecture
    2. The OSI model
    3. Defense in depth
    4. Firewalls
    5. Isolation & segmentation
    6. Monitoring, detection, & logging
    7. Cryptography fundamentals & applications
  4. Security of Networks, Systems, Applications, & Data
    1. Process controls – risk assessments
    2. Process controls – vulnerability management
    3. Process controls – penetration testing
    4. Network security
    5. Operating system security
    6. Application security
    7. Data security
  5. Incident Response
    1. Event vs. incident
    2. Types of incidents (categories)
    3. Security incident response
    4. Investigations, legal holds, & preservation
    5. Forensics
    6. Disaster recovery
  6. Security Implications & Adoption of Evolving Technology
    1. Current threat landscape
    2. Advanced persistent threats (APTs)
    3. Mobile technology – vulnerabilities, threats, & risk
    4. Consumerization of IT & mobile devices (BYOD)
    5. Cloud computing

Instructor: Philemon Pak, B.A. (Business Computing), CISA, CISM, CRISC

Philemon (Phil) has over 25 years of experience in the IT industry supporting businesses. He has worked in both private and public sectors in industries ranging from financial to the government, holding positions from application developer to an IT manager in charge of daily IT operations and strategic planning. For the past 7 years, Phil has been focusing in IT security, audit and risk management. Currently he is a freelance IT consultant with clients in the small and medium businesses of different industries. Aside from his consulting work, he is a contract instructor teaching at the University of Winnipeg’s Applied Computer Science department in the area of computer networking and security.