03
20
2023
Headline:
Tekedia Institute wins Velocity Mhagic Grand Prize of $60,000
2 years ago
[Register] Facyber Cybersecurity Training (Policy, Management, Tech, Forensics)
3 years ago
Home
ENROLL MINI-MBA
Forum
School
Tekedia Capital
Contact
Contact Us
Store
Partnership
Advisory
School
Programs | Mini-MBA
Tekedia Capital
Contact Us
Books
Store
Community
facebook
twitter
google+
rss
SUBSCRIBE HERE
MEMBERS LOGIN
Cybersecurity and Digital Forensics: Policy, Management and Technology
Beginning
Preamble
About the Author – Ndubuisi Ekekwe, PhD
Foreword – ‘Wale Olaoye, Halogen Security Group
Structure of Information Systems
1.0 – Computer Fundamentals
1.1 – Computer Language
1.2 – Fundamentals of Internet
1.3 – Number Systems
Information Security
2.0 – Access Control Techniques
2.1 – Account Administration
2.2 – Account Accessibility
2.3 – Authentication Techniques
Network Vulnerabilities
3.0 – Networking Types, ISO Model
3.1 – Networking Devices, Topologies
3.2 – IP Address, MAC Address & Ports
3.3 – DNS & DHCP Server
3.4 – Network Vulnerabilities & Types of Attacks
Foundation of Cybersecurity
4.0 – Hacking and Ethical Hacking
4.1 – Phases of Ethical Hacking
4.2 – Testing Systems
4.3 – Cyber-Warfare and Cyber-Terrorism
4.4 – Security Implementation and Governance
BYOD & SMAC Security
5.0 – SMAC
5.1 – SMAC Security & Forensics
5.2 – BYOD
5.3 – BYOD Security & Forensics
Preventing Cyber Intrusion
6.0 – What is Cyber-Attack?
6.1 – Cyber-Attack Response Plan
6.2 – Compliance Plan Against Cyber-Attack
6.3 – Technology for Preventing Cyber-Intrusion
6.4 – Detection Solutions – IDS, IPS, NAT and Honeypot
Emerging Cybersecurity Technologies
7.0 – Emerging Cybersecurity Technologies
7.1 – Changing Trends in Cybersecurity
7.2 – Social Media in Cybersecurity
7.3 – Cybersecurity Techniques
7.4 – Cyber Ethics
Ethical Hacking
8.0 – Basics of Hacking
8.1 – Hacking Business
8.2 – Hacking Process
8.3 – Testing Classification
8.4 – National Security
Malware Analysis
9.0 – Malware – Variants, Infections and Effects
9.1 – Malware Analysis – Goals and Types
9.2 – Methods of Malware Analysis
9.3 – Malware Setup, FUD and Avoidance (Part 1)
9.4 – Malware Setup, FUD and Avoidance (Part 2)
Penetration Testing & Tools
10.0 – Basics of Penetration Testing
10.1 – Pen Test Methodologies
10.2 – Vulnerability Assessment
10.3 – Penetration Testing Tools
10.4 – Penetration Testing Distributions
Intrusion Detection and Prevention
11.0 – Intrusion Detection System (IDS)
11.1 – Intrusion Prevention System (IPS)
11.2 – IDS vs. IPS vs. Firewall
11.3 – Common Detection Methodology
Network & OS Security
12.0 – Network Security
12.1 – Common Network Attacks
12.2 – Common Network Security
12.3 – OS Security Threats
12.4 – Cryptography-Network and OS Security
Ethics in Information Technology
13.0 – Morals, Ethics, and Laws
13.1 – Ethics in Business
13.2 – Ethics in Information Technology
13.3 – IT Policy
Security Policy Analysis
14.0 – Security Policy and Law
14.1 – Policy Development – Process & Lifecycle
14.2 – Policy Types & Standards
14.3 – Policy Troubleshooting
Security Policy Implementation
15.0 – Identify Needs, Issues and Threats
15.1 – Review & Write Policy
15.2 – Train and Enforce Policy
15.3 – Review and Modify
Global Cybersecurity Policy & Law
16.0 – Cyberspace & Cybercrimes
16.1 – Information Warfare & Legal Issues
16.2 – National Cybersecurity Policy & Law
16.3 – International Law & Policy
16.4 – Legal Process & Punishment
Enterprise Cybersecurity Policy
17.0 – Enterprise Cybersecurity Policy
17.1 – Vulnerability Assessment & Risk Analysis
17.2 – Security Testing Frameworks
17.3 – Vulnerability Prevention
17.4 – Tools & Techniques
Physical & Human Security Management
18.0 – Physical Security
18.1 – Physical Security Threats
18.2 – Planning and Executing
18.3 – Physical Security Checklist
18.4 – Theft and Locks Picking
Human Security Management
19.0 – Human Security
19.1 – Social Engineering Techniques
19.2 – Dumpster Diving & Shoulder Surfing
19.3 – Phishing & Countermeasure
19.4 – Staff Training
Cybersecurity Essentials for Leaders
20.0 – Planning & Managing Enterprise Information System
20.1 – Planning & Managing Enterprise Network Structure
20.2 – Privacy & Human Security Management
20.3 – Planning & Managing Security Assessment & Testing
20.4 – Disaster Recovery/Contingency Planning
Cyber Incident Analysis and Response
21.0 – Cybersecurity Incident & Risk
21.1 – Planning & preparing for Cyber Incident
21.2 – Planning Cybersecurity Incident Response
21.3 – Planning Risk Management
21.4 – Disaster Recovery & Business Continuity
Building Secure Enterprises & Organizations
22.0 – Secure Enterprises & Organizations
22.1 – Scope and Approach
22.2 – Business Goals & Security
22.3 – Baseline Analysis & Desired State
22.4 – Policy and Procedures
Cybersecurity Project Management
23.0 – Cybersecurity Project Management
23.1 – Key factors for Success
23.2 – Frameworks for Cybersecurity Management
23.3 – Implementation of Framework
23.4 – Basic Tenets
Digital Forensics & Evidence
24.0 – Digital Forensics
24.1 – Digital Forensics Model
24.2 – Approach and Process
24.3 – Evidence Gathering & Assessment
24.4 – Evidence Examination
SMAC & BYOD Forensics
25.0 – Social Media Forensics
25.1 – Mobile Forensics
25.2 – Cloud Forensics
25.3 – BYOD Forensics
25.4 – Digital Forensics Lifecycle
Guarding Against Cyber Intrusions
26.0 – Attacks, Tools for Defending Against
26.1 – Privileges and Access Rights
26.2 – Policy for Users and Organizations
26.3 – Contingency Plan
26.4 – Training
Information Systems Security & Assurance
27.0 – Information Systems Security & Assurance
27.1 – Information Security
27.2 – Information Assurance
27.3 – Information Security and Assurance
Cyber Intelligence & Counter Intelligence
28.0 – Cyber Intelligence & Counter Intelligence
28.1 – Information for Strategic Decision
28.2 – Counter Intelligence
28.3 – Governments & Businesses
28.4 – Incident handling & Damage control
Afterword – Enroll at Facyber.com
First Atlantic Cybersecurity Institute
Exploring New Ways to Support Employees Can Reduce Frauds at Nigerian Filling Stations
Exclusive Articles