The British Academy for Training and Development offers the Certified Cyber Security Specialist (CCSS) Course. The Certified Cyber-Security Specialist training aims to train individuals in the field of information security for identifying and protecting against and responding to threats within the network.
As a general rule, the information security practitioner would be savvy with network components, traffic, performance metrics, network utilisation, topology, location of each system, security policy, etc. Students will be prepared with the fundamental understanding of actual data transfer, network technologies, software technologies so as to comprehend how networks function, comprehend what software is all about, and lay down a basis of analysis on this subject.
Objective:
The main objectives of this course are:
Critique and set security requirements for their systems/networks.Defend systems from unauthorised access, alteration, or destruction.Install and maintain security tools such as firewalls, anti-virus software, patch management systems, etc.Determine the access rights, environments, and resources.Conduct vulnerability assessments, risk analyses, and security assessments.Identify irregularities and report violations.Oversee and monitor routine security administration.Develop and maintain business continuity and disaster recovery programmes.Apply skills for identifying, assessing, analyzing, responding to, and monitoring risks and threats within the organisation, facilitating informed decision-making and proactive risk mitigation.Master principles of asset security, including endpoint security, resilient architectures, secure design, SDLC practices, configuration management, and cryptography.Who Should Attend?
This course is ideal for:
Anyone starting a career in Information Security / Cyber-Security.IT professionals wanting to transition their career into Cyber-Security.Anyone needing a robust introduction to Cyber-Security.Anyone planning to work in a position that requires Cyber-Security knowledge.Anyone with Information Security / Cyber-Security responsibilities.Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge.Professionals familiar with basic IT and Information Security concepts and who need to round out their knowledge.How will attendees benefit?
This course is for those who want to become Certified Cyber Security Specialists (CCSS) and are offered highly valuable benefits in cyber threat identification, prevention, and mitigation, so as to be able to protect digital systems. They will read up on penetration testing and ethical hacking, which will allow them to observe and remedy security vulnerabilities in an effective manner.
With risk management, security governance, and compliance being core elements taught in the course, attendees will be able to align cybersecurity strategies within the context of industry regulations. Other topics taught will enhance and complement the attendee's skills in responding to security incidents through incident response and forensics, utilising investigative skills to handle cross-field incidents.
Attendees will also learn advanced security and IoT security techniques fundamental to protecting today's digital infrastructures. Equipped with advanced cybersecurity frameworks and best practices, they are prepared to advance in cybersecurity jobs throughout multiple industry spectrums.
Cyber-Security Essentials
Cyber-Security: The New Frontier
Cyber-Security & Cybercrime
Cyber-Security Management
Introduction to Cyber Terrorism
Internet Radicalization
Terrorist Use of the Internet
Cyber Terrorism Framework
Case Studies
Understanding Current Threats Landscape
CIS Top 20 Critical Controls
Cyber Range
Next Gen-Firewalls
New Age Threats
Viruses & Worms
Malware
Zero Day Attacks
Vulnerability Exploits
Phishing / Social Engineering
Cyber Espionage / Data Theft
Reconnaissance
Port Scan
Web-Based Recon & Information Gathering
Command Line Query
Vulnerability Management
Host Scanning
Web Application Scanning
CVE
Defending Against CVE Vulnerability Attacks
Monitoring & Defending Against Advanced Attacks
Splunk – A SIEM Monitoring Tool
Defending Against IP Layer DDOS Attacks
Defending Against Transport Layer DDOS Attacks
Defending Against Application Layer DDOS Attacks
Defending Against Botnet & C&C
Advanced Security Operations
Malware Blocking
Data Leak Prevention (DLP) / Data Filtering
File Blocking
URL Filtering
Evasion Tactics
Introduction to Security Incident & Incident Handling
Security Incident, Processes & Framework
Incident Handling
Security Incident Priority
Handling Intrusion Incident
Handling Malware Incident
Handling Phishing Incident
Handling Spam Incident
Log Analysis
Introduction to Log Analysis
Log Management
Log Visualization
Log Analysis
Hands-On
Note / Price varies according to the selected city
A training course in the modern preventive measures of information and documents security
2025-06-30
2025-09-29
2025-12-29
2026-03-30