Categories

Certified Cyber Security Specialist (CCSS) Course


Summary

The British Academy for Training and Development offers the Certified Cyber Security Specialist (CCSS) Course. The Certified Cyber-Security Specialist training aims to train individuals in the field of information security for identifying and protecting against and responding to threats within the network. 

As a general rule, the information security practitioner would be savvy with network components, traffic, performance metrics, network utilisation, topology, location of each system, security policy, etc. Students will be prepared with the fundamental understanding of actual data transfer, network technologies, software technologies so as to comprehend how networks function, comprehend what software is all about, and lay down a basis of analysis on this subject.

Objectives and target group

Objective:

The main objectives of this course are:

Critique and set security requirements for their systems/networks.Defend systems from unauthorised access, alteration, or destruction.Install and maintain security tools such as firewalls, anti-virus software, patch management systems, etc.Determine the access rights, environments, and resources.Conduct vulnerability assessments, risk analyses, and security assessments.Identify irregularities and report violations.Oversee and monitor routine security administration.Develop and maintain business continuity and disaster recovery programmes.Apply skills for identifying, assessing, analyzing, responding to, and monitoring risks and threats within the organisation, facilitating informed decision-making and proactive risk mitigation.Master principles of asset security, including endpoint security, resilient architectures, secure design, SDLC practices, configuration management, and cryptography.Who Should Attend?

This course is ideal for:

Anyone starting a career in Information Security / Cyber-Security.IT professionals wanting to transition their career into Cyber-Security.Anyone needing a robust introduction to Cyber-Security.Anyone planning to work in a position that requires Cyber-Security knowledge.Anyone with Information Security / Cyber-Security responsibilities.Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge.Professionals familiar with basic IT and Information Security concepts and who need to round out their knowledge.How will attendees benefit?

This course is for those who want to become Certified Cyber Security Specialists (CCSS) and are offered highly valuable benefits in cyber threat identification, prevention, and mitigation, so as to be able to protect digital systems. They will read up on penetration testing and ethical hacking, which will allow them to observe and remedy security vulnerabilities in an effective manner.

With risk management, security governance, and compliance being core elements taught in the course, attendees will be able to align cybersecurity strategies within the context of industry regulations. Other topics taught will enhance and complement the attendee's skills in responding to security incidents through incident response and forensics, utilising investigative skills to handle cross-field incidents.

Attendees will also learn advanced security and IoT security techniques fundamental to protecting today's digital infrastructures. Equipped with advanced cybersecurity frameworks and best practices, they are prepared to advance in cybersecurity jobs throughout multiple industry spectrums.

Course Content

Cyber-Security Essentials

  • Cyber-Security: The New Frontier

  • Cyber-Security & Cybercrime

  • Cyber-Security Management

  • Introduction to Cyber Terrorism

  • Internet Radicalization

  • Terrorist Use of the Internet

  • Cyber Terrorism Framework

  • Case Studies

Understanding Current Threats Landscape

  • CIS Top 20 Critical Controls

  • Cyber Range

  • Next Gen-Firewalls

  • New Age Threats

  • Viruses & Worms

  • Malware

  • Zero Day Attacks

  • Vulnerability Exploits

  • Phishing / Social Engineering

  • Cyber Espionage / Data Theft

Reconnaissance

  • Port Scan

  • Web-Based Recon & Information Gathering

  • Command Line Query

  • Vulnerability Management

  • Host Scanning

  • Web Application Scanning

  • CVE

  • Defending Against CVE Vulnerability Attacks

Monitoring & Defending Against Advanced Attacks

  • Splunk – A SIEM Monitoring Tool

  • Defending Against IP Layer DDOS Attacks

  • Defending Against Transport Layer DDOS Attacks

  • Defending Against Application Layer DDOS Attacks

  • Defending Against Botnet & C&C

  • Advanced Security Operations

  • Malware Blocking

  • Data Leak Prevention (DLP) / Data Filtering

  • File Blocking

  • URL Filtering

  • Evasion Tactics

Introduction to Security Incident & Incident Handling

  • Security Incident, Processes & Framework

  • Incident Handling

  • Security Incident Priority

  • Handling Intrusion Incident

  • Handling Malware Incident

  • Handling Phishing Incident

  • Handling Spam Incident

  • Log Analysis

Introduction to Log Analysis

  • Log Management

  • Log Visualization

  • Log Analysis

  • Hands-On

Course Date

2025-06-16

2025-09-15

2025-12-15

2026-03-16

Course Cost

Note / Price varies according to the selected city

Members NO. : 1
£4300 / Member

Members NO. : 2 - 3
£3440 / Member

Members NO. : + 3
£2666 / Member

Related Course

Featured

A training course in the modern preventive measures of information and documents security

2025-06-30

2025-09-29

2025-12-29

2026-03-30

£4600 £4600

$data['course']