Introduction to Cyber Security for Practitioners Training

This 3-day, instructor-led training addresses the basics of networking, cybercrime, various security concepts, and how to address common security concerns within your organization.

Course Overview

This training course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.


Introduction to Cyber Security for Practitioners Training

11/15/21 - 11/17/21 (3 days)

8:30AM - 4:30PM EST

Tysons Corner, VA
11/22/21 - 11/24/21 (3 days)

8:30AM - 4:30PM EST

Columbia, MD
11/22/21 - 11/24/21 (3 days)

8:30AM - 4:30PM EST


Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

  • Explain the concepts of information systems security as applied to an IT infrastructure
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure
  • Explain the role of access controls in implementing a security policy
  • Explain the role of operations and administration in effective implementation of security policy
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems
  • Explain how businesses apply cryptography in maintaining information security
  • Analyze the importance of network principles and architecture to security operations
  • Explain the means attackers use to compromise systems and networks and defenses used by organizations
  • Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector

Course Outline

The Need for Information Systems

  • Information systems security
  • The Internet of Things is changing how we live
  • Malicious attacks, threats, and vulnerabilities
  • Drivers of the information Security business

Securing Today’s Information Systems

  • Access controls
  • Security operations and administration
  • Auditing, testing, and monitoring
  • Risk, response, and recovery
  • Cryptography
  • Networks and telecommunications
  • Malicious code and activity

Information Security Standards, Education, Certifications, and Laws

  • Information security standards
  • Information systems security education and training  
  • Information Security Professional Certifications  
  • U.S. compliance laws


Who should take this course?

This course is intended for IT security professionals who want to establish a career in cyber security.

What is the recommended experience for this course?

Students should have minimal experience in the IT field, specifically in IT security; and an understanding of networking concepts and best security practices.

Subscribe now

Get new class alerts, promotions, and blog posts