Course overview

ALC’s 5-day Cyber Security Foundation+Practitioner® course is designed for anyone who wants a sound understanding of Information / Cyber Security and a solid base on which to build their career. There are no pre-requisites to attend.

The course is structured into two modules.

Foundation Module (3 days)

The Foundation module is designed to provide a good strong introduction to the key knowledge areas of Cyber Security. You don\'t need to be an aspiring security professional to do this module, it is suitable for all levels. The course follows a robust syllabus that covers all the key areas you need to know.

Practitioner Module (2 days)

This module is all about applying the theory. It builds upon and reinforces the material learnt in the Foundation module. The course makes strong use of a case study, along with workshops and exercises. Participants will be provided with sample Word and Excel templates for use.

Which option to choose?

You may enrol in Foundation only, or in the 5-day Foundation/Practitioner combined, according to your needs.


Learning outcomes

The key objective of the Foundation module is for each participant to be able to leave the course with a good understanding and appreciation of the fundamentals of Cyber Security:

  • Cyber Security Concepts
  • Risk Management
  • Security Architecture
  • Implementing security in networks, endpoint systems, applications and data
  • Business Continuity and Disaster Recovery Planning
  • Incident Response

The key objective of the Practitioner module is for each participant to be able to apply the theory learnt from the Foundation course to a case study. During this module you will:

  • Develop an asset register
  • Identify threats and determine risks, and make recommendations
  • Create a data classification scheme and use this for managing risks with cloud solutions
  • Identify and discuss the advantages and disadvantages of different encryption technologies
  • List and prioritise busines- critical operations for business continuity
  • Identify and discuss various approaches to security assurance
  • Identify risk remediation strategies and include in a brief management report

Who should attend

The Foundation course is designed for:

  • Anyone needing a robust introduction to Cyber Security
  • Anyone planning to work in a position that requires cyber security knowledge
  • Anyone starting a career in Information / Cyber security
  • IT professionals wanting to transition their career into Cyber Security
  • Anyone with information / cyber security responsibilities
  • Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge
  • Professionals familiar with basic IT and information security concepts and who need to round out their knowledge

The Practitioner module is suitable for anyone who has previously taken the Foundation module.  Because the content focuses on the practical side it would typically attract those who have a more serious career interest in security.

The 5-day combined course is ideal for those who have 2 years or fewer experience in security or those who are already in IT and now want to transition into security.

Course contents

1    Introduction
  • Concepts and Definitions
    • Difference between IT Security, Information Security and Cyber Security
    • Assets, Threats & Vulnerabilities
    • Likelihood, Consequence and Impact
    • Inherent Risk, Current Risk and Residual Risk
  • Cyber Security Strategy
    • Supporting Business Goals and Objectives
    • Cyber Security Policy Framework
    • Awareness, Training and Education
2    Risk Management
  • Risk Management Concepts and Definitions
    • Risk Avoidance, Mitigation, Transfer and Acceptance
    • Risk Appetite and Risk Tolerance
  • Threats and Opportunities
    • Assessing the current threat landscape
    • Advanced Persistent Threats
    • Bring Your Own Device or Technologies
    • The Internet of Things
    • Insourcing and Outsourcing
  • Controls and Enablers
  • Business Impact Analysis
3    Security Architecture
  • The key role of security architecture
  • Concepts and Definitions
  • Security Architecture Frameworks
  • Security Architecture Design Principles
  • Service Models
    • In-sourcing
    • Managed Services
    • Cloud Services
  • OSI and TCP/IP Models
  • Cryptography
    • Symmetric, Asymmetric and Hashing Algorithms
    • Non-Repudiation
    • Real-world Use Cases
4   Implementing Security
  • Network Security
    • Routers, switches, firewalls, intrusion detection and prevention
  • Endpoint Security
    • Servers, desktop systems, laptops, tablets and mobile devices
  • Application Security
    • Software Development Lifecycle
    • OWASP Top 10
    • Web Application Firewall
  • Data Security
    • Data owners, data classification, labelling
    • Access control
    • Data governance and lifecycle
    • Data remanence
5   Business Continuity and Disaster Recovery Planning
  • Business Continuity Planning
  • Disaster Recovery Planning
  • BCP/DRP Training and Awareness
  • Testing and Maintenance of the BCP/DRP
  • Security Assurance
    • Vulnerability Assessments and Penetration Testing
    • Minimum Security Baselines
6    Incident Response
  • Detection
    • Auditing, logging and security technologies
    • Security Information and Event Management System (SIEM)
  • Prevention
    • Authorisation, encryption, firewalls, intrusion prevention, anti-malware
  • Response
    • Security events and incidents
    • Legal aspects
    • Incident Response Process
    • Incident Management Team
    • Computer Forensics

Cyber Security Practitioner (2 days)

Day 1

1. Introduction of Case Study
2. Review of Concepts and Risk Management
  • Exercise #1 – Development of a cyber asset register
  • Exercise #2 – Development of a threat taxonomy
  • Exercise #3 – Identification of inherent, current and residual risks
3. Review of Service Provider models
  • Exercise #4 – Recommendations for service provider models in addressing risks
4. Review of Data Classification and Object Labelling
  • Exercise #5 – Establish a data classification scheme
  • Exercise #6 – Strategies to safeguard data held and managed in the cloud

Day 2

5. Review of Security Architecture
  • Exercise #7 – Safeguarding data in transit using encryption
  • Workshop #1 – List the advantages and disadvantages of encryption
6. Review of Business Continuity
  • Exercise #8 – Identify and rank the most important business operations
  • Workshop #2 – List the advantages and disadvantages of choosing security audits, vulnerability assessments and penetration tests
7. Review of Reporting to Management
  • Exercise #9 – Develop the first part of a management report highlighting the most appropriate strategies for managing various risks

Course fees

Foundation and Practitioner Certificate Exam

The Cyber Security Foundation exam is held in the classroom at the end of Day 3. This exam is 90 minutes duration and comprises 60 multiple choice questions with a pass mark of 65%.

The Cyber Security Practitioner exam is held in the classroom at the end of Day 5. This exam is 90 minutes duration and comprises 50 multiple choice single answer questions plus 30 multiple choice multiple answer questions with a Pass mark of 65%.

A Foundation or Practitioner Certificate is issued to those who successfully pass the relevant exam.

One free exam re-sit is available for each module.