The objective of the course is to provide a comprehensive but necessarily high level overview across industry standard technology and platforms, illuminating the technology and its specific cyber governance, risk and assurance challenges without technically challenging the learner to hands-on labs.
The course takes the learner back to computer basics to build the individuals understanding common technology platforms through to the network layer and on via virtualisation technologies, cloud systems, telecoms and modern communications and finishing with an insight into the world of protective monitoring, challenges and pitfalls of security events logs and analysis. Common methods of attack provides the learner with an insight into many of the most popular attack vectors today. Closing the third day with a module focused on the benefits and pitfalls of encryption.
Day four begins with the cyber law and the context in which security practitioners and organisations have to operate within. Each of us has a digital footprint and the technology we use within our enterprise as an attack surface, the next module joins these two principles and explains the challenges for assurance around leaky data. During the remainder of day four and five we introduce the layered cyber concepts and the deeper governance required throughout the entire lifecycle covering a number of specialist areas essential to the rounded security practitioner.
Each day provides insight into the technical subject matter with the crucial security subtext. Knowledge check exercises, where delegates work in groups to discuss and provide solutions to scenarios offering an explanation with a rationale in each instance of why this is important from a security assurance perspective.
During the delivery we will provide the delegates with access to recorded video demonstrations of the technical subject matter, which will enhance the learners experience whilst preserving any technical confidence as there are no requirements for the learner to undertake any 'hands-on' labs.
IISP Skills Alignment
This course is aligned to the following Institute of Information Security Professionals (IISP) Skills. More details on the IISP skills framework can be found here.
IISP Skills: A1, A2, A6, A7, B1, B2, C1, C2, D1, D2, E1, E2, E3, F2, G1
Continuous Professional Development (CPD)
CPD points can be claimed for NCSC accredited courses at the rate of 1 point per hour of training for NCSC accredited courses (up to a maximum of 15 points).
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
- Computing Foundation, Data Storage & Memory
- OSI Protocol Stack
- Network Architecture
- Internet Primer
- Network Security
- Modern Communications
- Virtualisation & Cloud Technologies
- Protective Monitoring
- Common Methods of Attack
- Cyber and the Legal Framework
- Digital Footprints
- Information Assurance landscape
- Risk Management
- Risk Treatment
- Physical Security
- Personnel Security
- Service Assurance & Standards
- Software Security Assurance
- Secure Development Process
- Threat Modelling
- STRIDE Mitigation
- Security Best Practices
- Introduction to Security Architecture
Computing Foundation, Data Storage and Memory
Computer system components, operating systems (Windows, Linux & Mac), different types of storage, file systems (FAT & NTFS), memory management.
OSI Protocol Stack
Switched networks, packet switching vs circuit switching, packet routing delivery, routing, internetworking standards, OSI model, and 7 layers.
TCP/IP protocol suite, types of addresses, physical address, logical address, IPv4, IPv6, port address, specific address, network access control,
Network fundamentals, network types (advantages & disadvantages), WAN vs LAN, DHCP
How does data travel across the internet? End to end examples for web browsing, send emails, using applications - explaining internet architecture, routing, DNS.
Secure planning, policies and mechanisms, Active Directory structure, introducing Group Policy (containers, templates, GPO), security and network layers, IPSEC, SSL / TLS (flaws and comparisons) SSH, Firewalls (packet filtering, state full inspection), application gateways, ACL's.
VoIP, wireless LAN, Network Analysis and Sniffing, Wireshark.
Virtualisation & Cloud Technologies
Virtualisation definitions, virtualisation models, terminologies, virtual models, virtual platforms, what is cloud computing, cloud essentials, cloud service models, security & privacy in the cloud, multi-tenancy issues, infrastructure vs data security, privacy concerns.
Security Information Event Management (SIEM) processes and architecture, SIEM features, user activity monitoring, real time event correlation, log retention, file integrity monitoring, security auditing & automation auditing, what to audit, implementation guidelines, what to collect, Windows Event Log, UNIX Syslog, logging at an application level, audit trail analysis, approaches to data analysis.
Common Methods of Attack
Cyber exploits, understanding malware, cross site scripting, SQL Injection, DDOS, input validation, buffer-overflow, targeted attacks and advanced persistent threats (APT).
Uses of encryption technology, symmetric / asymmetric key encryption, public and private keys, weaknesses, decryption, hashing, digital signatures, PKI, certificates authorities, data at rest and in transit, SSL.
Cyber and the Legal Framework
Legislation, chain of custody, reporting and assurance within the context of a legal framework. Inc. overview of Data Protection Act (DPA 2018) and the EU General Data Protection Regulation (GDPR).
Internet foundations, domain name system, whois (Inc. worked example), Traceroute, Internet analysis, search engines, Tools for finding information on people and companies, username searchers, email lookups, disposable emails, passwords, internet communities and culture, deep web directories and leaking websites.
Overview - the drivers for UK Information Assurance, initiatives and programmes, risk assessment vs risk management, risk components.
Risk Management and Risk Treatment
Business context and risk management approach, risk management lifecycle, who delivers risk management - where in the lifecycle, understanding the context, legal and regulatory. Risk Treatment - Identify the ways of treating risks, methods of gaining assurance, understanding the nature of residual risk, collecting evidence that supports decisions, risk management decisions.
Physical security - lighting, CCTV, fencing, intrusion detection, screening, destruction, UPS and generators, access and control of entry.
People, employees, contractors, customers (resource, vulnerability, threat), recruitment, screening, Social Engineering, Common People Exploits, T&C's, in role, change in role, termination, insider threat, supply chain challenges.
Service Assurance & Standards
Assurance perspective – including CPA, CAPS, FIPS, CE, Common Criteria, SPF. Summary of common industry standards. (Inc. OWASP, ISO27001, PCI-DSS)
Software Security Assurance
Principles for software security, (securing the weakest link, defence in depth, failing securely, least privilege, separation of privilege), IA design principles
Secure Development Process
Secure by Design, Secure Development Life Cycle (SDLC)
What is threat modelling, threat modelling processes
STRIDE: Risk Mitigation
Risk mitigation options
Security Best Practice
Reduce the attack surface, defence in depth, test security, weaknesses and vulnerabilities, secure coding, learn from mistakes
Introduction to Security Architecture
Security design architecture, enterprise design frameworks (TOGAF, ZACHMAN, SABSA), patterns (NCSC, Open Security Architecture)
Knowledge check, scenario exercise questions based upon days 4 - 5 delivery.
Independent APMG Examination sat on the final day of the class.
Candidates will receive individual emails to access their AMPG candidate portal, typically available two weeks post exam. If you experience any issues, please contact the APMG technical help desk on 01494 4520450.
50, multiple choice (4 multiple choice answers only 1 of which is correct)
Frequently asked questionsSee all of our FAQs
How can I create an account on myQA.com?
There are a number of ways to create an account. If you are a self-funder, simply select the "Create account" option on the login page.
If you have been booked onto a course by your company, you will receive a confirmation email. From this email, select "Sign into myQA" and you will be taken to the "Create account" page. Complete all of the details and select "Create account".
If you have the booking number you can also go here and select the "I have a booking number" option. Enter the booking reference and your surname. If the details match, you will be taken to the "Create account" page from where you can enter your details and confirm your account.
Find more answers to frequently asked questions in our FAQs: Bookings & Cancellations page.
How do QA’s virtual classroom courses work?
Our virtual classroom courses allow you to access award-winning classroom training, without leaving your home or office. Our learning professionals are specially trained on how to interact with remote attendees and our remote labs ensure all participants can take part in hands-on exercises wherever they are.
We use the WebEx video conferencing platform by Cisco. Before you book, check that you meet the WebEx system requirements and run a test meeting (more details in the link below) to ensure the software is compatible with your firewall settings. If it doesn’t work, try adjusting your settings or contact your IT department about permitting the website.
Learn more about our Virtual Classrooms.
How do QA’s online courses work?
QA online courses, also commonly known as distance learning courses or elearning courses, take the form of interactive software designed for individual learning, but you will also have access to full support from our subject-matter experts for the duration of your course. When you book a QA online learning course you will receive immediate access to it through our e-learning platform and you can start to learn straight away, from any compatible device. Access to the online learning platform is valid for one year from the booking date.
All courses are built around case studies and presented in an engaging format, which includes storytelling elements, video, audio and humour. Every case study is supported by sample documents and a collection of Knowledge Nuggets that provide more in-depth detail on the wider processes.
Learn more about QA’s online courses.
When will I receive my joining instructions?
Joining instructions for QA courses are sent two weeks prior to the course start date, or immediately if the booking is confirmed within this timeframe. For course bookings made via QA but delivered by a third-party supplier, joining instructions are sent to attendees prior to the training course, but timescales vary depending on each supplier’s terms. Read more FAQs.
When will I receive my certificate?
Certificates of Achievement are issued at the end the course, either as a hard copy or via email. Read more here.