Cybersecurity Specialist Training Program – Based on ISACA ITCA & Microsoft SC-900
Join the Training
Training Graduate:
  • Has basic-level knowledge of information security methodology and management;
  • Understands cybersecurity-related threats, can relate them to company assets, and apply protective measures to mitigate risks;
  • Can respond appropriately to security incidents;
  • Monitors IT infrastructure for security, detects anomalies, and applies threat intelligence;
  • Is knowledgeable in Microsoft security technologies and can select appropriate security components for their organization or company.
Program
  • Week 1
    17.10. Online Webinar with Expert 1: Course Introduction

  • Week 2
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Definition and Roles of Information Security
    • Recovery and Business Continuity Planning
    • Information Security Basics, Principle of Least Privilege
    • Threat Vectors
    31.10. Online Webinar with Expert 2: Weekly Summary and Introduction to the Next Topic
  • Week 3
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Attack Chain, Attackers’ Motivations
    • Types of Malware and Their Symptoms
    • Attack Techniques
    07.11. Online Webinar with Expert 3: Weekly Summary and Introduction to the Next Topic
  • Week 4
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Attack Techniques
    • Risk Management and Standards
    • Zero Trust
    14.11. Online Webinar with Expert 4: Weekly Summary and Introduction to the Next Topic

  • Week 5
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Network Components
    • Firewall and Endpoint Firewall
    • Authentication and Authorization
    • Cloud Service Models and Cloud Services
    21.11. Online Webinar with Expert 5: Weekly Summary and Introduction to the Next Topic
  • Week 6
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Data Security and Classification
    • Encryption, Digital Signatures, Hash Algorithms
    • Public Key Infrastructure (PKI)
    • Encrypted Protocols (VPN, SSH)
    28.11. Online Webinar with Expert 6: Weekly Summary and Introduction to the Next Topic
  • Week 7
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Implementing a SOC (Security Operations Center)
    05.12. Online Webinar 7: Weekly Summary and Introduction to the Next Topic
  • Week 8
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Vulnerability Management
    • Penetration Testing
    12.12. Online Webinar with Expert 8: Weekly Summary and Introduction to the Next Topic
  • Week 9
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Antivirus and Endpoint Detection & Response (EDR)
    • Handling Security Incidents
    19.12. Online Webinar with Expert 9: Weekly Summary and Introduction to the Next Topic
  • Week 10
    Independent E-Learning
    • ISACA ITCA: Cybersecurity Fundamentals Online Training
    • Cybersecurity Tools
    02.01. Online Webinar with Expert 10: Weekly Summary and Introduction to the Next Topic
  • Week 12
    16.01. Online Webinar with Expert 12: Project Consultations
  • Week 13
    Independent Work: Project Preparation
    23.01. Online Webinar with Expert 13: Project Consultations.
  • Week 14
    Project Work: Preparation
    30.01. Online Webinar with Expert 14: Project Consultations
  • Week 15
    Project Work: Preparation (Submission Deadline: 04.02 at 12:00)
    • 06.02. Online Webinar with Expert 15:00 Project Presentations and Training Summary