CSX Cyber Security Fundamentals Training Workshop

 

Date: January 17-18th

Time: 9am – 3pm

Venue: FST 113, Ground floor, Natural Sciences Building

Cost: $90.00 (To be paid at the DCIT Office) 
        Payments will be accepted only from students who have successfully registered for the workshop.
        The deadline for payments (cash only) is Jan. 15. 2019, 2:00 pm at the Dept. Computing and Information Technology.
 

The ISACA and the UWI ISACA Student Group in collaboration with the Department of Computing and Information Technology will be hosting a Cyber Security Fundamentals Training Workshop. This workshop will cover key concepts and principles in security, methods of securing applications and networks, and more.

The knowledge-based Cybersecurity Fundamentals Certificate is ideal for current students and recent college/university graduates. As you prepare for a career in this increasingly important field, the Certificate can enable you to:

  • Demonstrate your understanding of the principles that frame and define cybersecurity, and the integral role of cybersecurity professionals in protecting enterprise data
  • Set yourself apart and have your resume/CV rise to the top of recruiters' stacks
  • Start your cybersecurity career strong

 

Domain 1: Cyber Security Concepts 
Some topics covered: Cyber Security Roles, Risk Management Processes, including steps and methods for assessing risk, Relevant Laws, Policies, Procedures and Governance Requirements

Domain 2: Cyber Security Architecture Principles
Some topics covered: Defence in Depth Principles and Network Security Architecture, Encryption Algorithms, Cryptography, Network Security Architecture Concepts, including topology, protocols, components and principles

Domain 3: Security of Networks, Systems, Applications and Data
Some topics covered: Remote Access Technology, Local Specialized System Requirements for Safety, Performance and Reliability, Virtualization Technologies and Virtual Machine Development and Maintenance

Domain 4: Incident Response
Some topics covered: Security Event Correlation Tools, Basic Concepts and Practices of Processing Digital Forensics Data, Common Forensic Tool Configuration and Support Applications

Domain 5: Security Implications and Adoption of Evolving Technology
Some topics covered: Cloud Concepts Around Data and Collaboration, Risk of Moving Applications and Infrastructure to the Cloud, Emerging Technology and Associated Security Issues, Risks and Vulnerabilities

You can also purchase a textbook that will contain the material online or when registering.
See here: https://svpr-isg-a1.isaca.org/ISGweb/Purchase/ProductDetail.aspx?Product_code=CSXG2

 

Register here: https://goo.gl/forms/eCBI1JT4liATofjX2

 

For more information contact:

Rachel Peters - Rachel.peters@my.uwi.edu
Phaedra Mohammed -  phaedra.mohammed@sta.uwi.edu

Top of Page