Course Overview

Course Curriculum

Course Content

  • AEP CS - Preparing for Your Cybersecurity Executive Journey

    Preview
    • Lesson 01: Fundamentals of Cyber Security

      Preview
      • 1.01 Introduction to Cyber Security
        04:49
      • 1.02 Difference between Information Security and Cyber Security
        02:37
      • 1.03 Cyber Crime Statistics
        03:50
      • 1.04 Factors Affecting Cybersecurity
        01:11
      • 1.05 CIA Triad
        03:35
      • 1.06 Governance Risk Management and Compliance
        05:21
      • 1.07 Cybersecurity Roles
        01:03
      • 1.08 Approaches to Cyber Security
        00:39
      • 1.09 Cybersecurity Key Terms
        04:03
    • Lesson 02: Threat Actors Attacks and Mitigation

      Preview
      • 2.01 Threat Actors and Categories
        03:41
      • 2.02 Threat to a System
        00:35
      • 2.03 Malware and Its Types
        06:59
      • 2.04 Malware Attacks
        01:34
      • 2.05 Denial of Service Attack
        01:41
      • 2.06 Distributed Denial of Service
        05:38
      • 2.07 Application Layer Attacks
        02:54
      • 2.08 Software Codes and Security
        02:42
      • 2.09 Software Testing Methods
        02:36
      • 2.10 Social Engineering
        01:08
      • 2.11 Social Engineering Attacks Categories
        03:13
    • Lesson 03: Security Policies and Procedures

      • 3.01 Security Management Plan and Its Types
        03:17
      • 3.03 Security Policy and Types
        02:49
      • 3.04 Security Policy Framework
        01:55
      • 3.05 Due Care and Due Diligence
        02:03
    • Lesson 04: Cybersecurity Mitigation Methods

      Preview
      • 4.01 Information Technology Control Countermeasure and Control Categories
        02:38
      • 4.02 Defense in Depth or Layered Approach
        01:33
      • 4.03 Identity Management
        01:27
      • 4.04 Identification and Authentication
        01:31
      • 4.05 Authorization and Accountability
        01:28
      • 4.06 Auditing Monitoring and Patch Management
        02:48
      • 4.07 System Hardening
        03:10
      • 4.08 Change Control
        01:29
      • 4.09 Asset Management
        00:46
      • 4.10 Data Management and Stages of Data
        01:50
      • 4.11 Information Lifecycle
        02:13
      • 4.12 Encryption
        01:17
      • 4.13 Cryptography
        01:08
      • 4.14 Types of Encryption
        02:33
      • 4.15 Incident Response
        01:00
      • 4.16 Security Training and Awareness
        01:02
    • Lesson 05: Secure Enterprise Architecture and Component

      Preview
      • 5.01 Enterprise Network Architecture
        15:34
      • 5.02 Basics of Network Architecture
        02:02
      • 5.03 Open System Interconnection Model
        10:01
      • 5.04 Types of Network
        00:43
      • 5.05 Data Communication Systems
        02:07
      • 5.06 Computer Based and Business Information Systems
        09:22
      • 5.07 Hardware Failure
        04:51
      • 5.08 Host Based Security
        01:17
    • Lesson 06: Wireless Networks

      Preview
      • 6.01 Wireless Networks and Virtual Private Networks
        11:31
      • 6.02 Wireless Networks Example Bluetooth
        02:01
      • 6.03 Radio Frequency Identification
        07:02
      • 6.04 Emanation Security
        03:44
    • Lesson 07: Network Security Controls

      Preview
      • 7.01 Introduction to Network Security Controls
        00:46
      • 7.02 Network Based Security
        03:18
      • 7.03 Firewall and its Features
        06:22
      • 7.04 Intrusion Detection System
        04:10
      • 7.05 Intrusion Prevention System
        00:58
      • 7.06 Network Admission Control
        01:33
      • 7.07 Honeypots
        02:06
    • Lesson 08: Security Testing

      • 8.01 Introduction to Security Testing
        01:56
      • 8.02 Penetration Testing
        03:52
      • 8.03 Security Audits
        02:03
    • Lesson 09: Incident Management

      Preview
      • 9.01 Introduction to Incident Management and Response Plan
        10:44
      • 9.02 Incident Management Stages
        05:00
      • 9.03 Incident Response Metrics
        03:32
      • 9.04 Incident Management Team
        01:52
      • 9.05 Gap Analysis
        02:52
    • Lesson 10: Digital Forensics

      Preview
      • 10.01 Introduction to Digital Forensics
        04:09
      • 10.02 Forensics Investigation Process
        02:09
      • 10.03 Forensic Process Best Practices
        03:18
      • 10.04 Forensic Investigative Assessment Types
        04:14
      • 10.05 Digital Evidence
        02:53
      • 10.06 Chain of Custody
        01:03
    • Lesson 11: Business Continuity and Disaster Recovery

      Preview
      • 11.01 Business Continuity Planning and Disaster Recovery
        02:24
      • 11.02 Seven Phases of a Business Continuity Plan
        03:12
      • 11.03 Business Impact Analysis
        04:22
      • 11.04 Types of Disaster Recovery Sites and Testing
        03:01
    • Lesson 12: Cloud Virtualization, BYOD and IOT Security

      Preview
      • 12.01 Virtualization
        02:13
      • 12.02 Hypervisor
        03:05
      • 12.03 Cloud Computing
        05:58
      • 12.04 Bring Your Own Device (BYOD)
        01:39
      • 12.05 Internet of Things (IoT)
        01:59
    • Lesson 13: Information Security Governance and Risk Assessment

      Preview
      • 13.01 Introduction to Information Security Governance and Risk Management
        01:44
      • 13.02 Information Security Governance
        05:19
      • 13.03 Business Drivers
        02:21
      • 13.04 Enabling Technology
        04:07
      • 13.05 Information Security Governance Outcomes
        04:15
      • 13.06 Management Support
        04:57
      • 13.07 Establish reporting and communication Channels
        01:08
      • 13.08 Performance Management
        04:18
      • 13.09 Risk Management
        02:31
      • 13.10 Quantitative Risk Analysis
        02:18
      • 13.11 Risk Management Methods
        01:42
      • 13.12 Key Risk Indicator and Key Performance Indicator
        02:54
      • 13.13 Risk Management Framework
        04:17
    • Lesson 14: Information Security Programs

      Preview
      • 14.01 Introduction to Information Security Programs
        03:22
      • 14.02 COBIT Framework
        02:14
      • 14.03 ISO IEC 27001 2013 Framework
        01:30
      • 14.04 ISO 27001 2013 Domains
        02:25
      • 14.05 Information Security Program
        05:22
      • 14.06 Supply Chain Risk Management
        03:24
      • 14.07 Supply Chain Risks
        02:01
      • 14.08 Personnel Management
        01:29
      • 14.09 Case Study AWS Outage
        02:03
      • 14.10 Common Information Security Program Challenges
        00:40

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.