Cyber Security Body of Knowledge (CyBOK) Training Course
CyBOK offers a structured method for defining foundational and standardized knowledge in the realm of cyber security. Its goal is to integrate the cyber security domain into a unified academic curriculum and industry training framework, effectively mapping the knowledge areas covered by CyBOK.
This instructor-led, live training (available online or on-site) is designed for software engineers and IT professionals seeking to deepen their understanding of CyBOK and enhance their theoretical and practical cyber security skills.
Upon completion of this training, participants will be able to:
- Comprehend the core concepts, definitions, and principles of cyber security.
- Develop deep expertise in cyber security by applying the CyBOK knowledge areas.
- Acquire comprehensive foundational knowledge necessary to implement the CyBOK framework.
- Promote community and organizational initiatives to emphasize data security and privacy.
- Explore opportunities for obtaining specializations and credentials in cyber security careers.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Practical implementation within a live lab environment.
Course Customization Options
- The training primarily utilizes open-source tools tailored to your operating system (Windows, Linux, Mac, mobile devices, etc.) and organizational needs. Please contact us to arrange.
- For customized training requests, please contact us to arrange.
Course Outline
Introduction
- Overview of Cyber Security concepts and definition
- Understanding the CyBOK knowledge areas (KAs)
- Implementing CyBOK knowledge to address security issues
Human, Organisational, and Regulatory Aspects
- Risk management and governance
- Law and regulation
- Human factors
- Privacy and online rights
Attacks and Defences
- Malware and attack technologies
- Adversarial behaviors
- Security operations and incident management
- Forensics
Systems Security
- Cryptography
- Operating systems and virtualisation
- Distributed systems security
- Formal methods for security
- Authentication, authorization, and accountability
Software Platform and Security
- Software security
- Web and mobile security
- Secure software lifecycle
Infrastructure Security
- Applied cryptography
- Network security
- Hardware security
- Cyber-physical systems security
- Physical layer and telecommunications security
Summary and Next Steps
Requirements
- Basic understanding of cyber security and software engineering
Target Audience
- Software engineers
- IT professionals
Open Training Courses require 5+ participants.
Cyber Security Body of Knowledge (CyBOK) Training Course - Booking
Cyber Security Body of Knowledge (CyBOK) Training Course - Enquiry
Cyber Security Body of Knowledge (CyBOK) - Consultancy Enquiry
Testimonials (2)
I enjoyed the hands on labs because they were engaging and very knowledge sharing
Sinoxolo - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
The huge amount of new information/knowledge I gained from this training!
David - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is designed for system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
Upon completing this training, participants will be capable of:
- Installing and configuring 389 Directory Server.
- Grasping the features and architectural framework of 389 Directory Server.
- Configuring the directory server using both the web console and CLI.
- Establishing and monitoring replication to ensure high availability and load balancing.
- Managing LDAP authentication via SSSD for enhanced performance.
- Integrating 389 Directory Server with Microsoft Active Directory.
ABAP Secure code
14 HoursUpon completing this training, participants will be capable of:
- Explaining application security and potential vulnerabilities
- Describing ABAP programming best practices and the handling of SY-SUBRC
- Understanding injection vulnerabilities
- Describing security testing tools
- Explaining ATC and CVA
Course Format
- Interactive lectures and discussions
- Extensive exercises and practical work
- Hands-on implementation in a live-lab environment
Active Directory for Admins
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Applications Security Foundation
21 HoursThis course addresses the essential secure coding topics pertinent to a wide range of web application developers. It instructs students on the principles of secure programming by examining specific code snippets, identifying security vulnerabilities, and implementing corrective measures.
Participants will observe demonstrations of real-world attacks and learn effective prevention strategies, building confidence as they work to enhance their applications' security.
Duration: 3 days
Who Should Attend: Developers seeking to expand their expertise in secure coding.
Upon Completion
• Students will gain knowledge in:
• Web Application Security.
• Common Web Application Risks.
• Demo Web Application Penetration Testing.
• Data Validation.
• Authentication.
• Session Management.
• Secure SDLC.
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. While it offers a wide array of security features designed to facilitate the development of secure software, it also lacks certain security aspects found in other handheld platforms. This course provides a comprehensive overview of these features and highlights critical shortcomings related to the underlying Linux system, the file system, and the general environment, as well as those associated with permissions and other Android software development components.
Common security pitfalls and vulnerabilities are explained for both native code and Java applications, accompanied by recommendations and best practices to prevent and mitigate these issues. The topics discussed are often supported by real-life examples and case studies. Finally, the course briefly covers how to utilize security testing tools to identify security-related programming bugs.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about security solutions on Android
- Learn to use various security features of the Android platform
- Gain information about recent Java vulnerabilities on Android
- Learn about typical coding mistakes and how to avoid them
- Understand native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their weaknesses
- Access sources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursDeveloping a secure networked application is challenging, even for developers familiar with cryptographic building blocks like encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, the course establishes a solid foundation on the core requirements of secure communication: secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. It also highlights common threats to these requirements and presents real-world solutions.
Given that cryptography is a critical component of network security, the course examines the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on complex mathematical theories, these topics are approached from a developer’s perspective, featuring typical use-case examples and practical considerations such as public key infrastructures. The course introduces security protocols used in various areas of secure communication, with an in-depth exploration of widely adopted protocol families like IPSEC and SSL/TLS.
Typical cryptographic vulnerabilities are discussed, both concerning specific algorithms and protocols. Examples include BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each issue, practical implications and potential consequences are explained without delving into deep mathematical details.
Finally, as XML technology is central to data exchange in networked applications, the course covers XML security. This includes the use of XML in web services and SOAP messages, alongside protection mechanisms like XML signature and XML encryption. The course also addresses weaknesses in these protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Gain a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course provides an overview of securing C/C++ code against malicious actors who may exploit vulnerabilities related to memory management and input handling. The course emphasizes the core principles of writing secure code.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the diverse security services provided by Java, and may remain unaware of the various vulnerabilities pertinent to web applications built with Java.
Beyond introducing the security components of Standard Java Edition, this course addresses security challenges in Java Enterprise Edition (JEE) and web services. Discussions on specific services are preceded by foundational knowledge of cryptography and secure communication. A range of hands-on exercises explores both declarative and programmatic security techniques within JEE, while also covering transport-layer and end-to-end security for web services. Participants will gain practical experience by applying the discussed APIs and tools through multiple real-world scenarios.
The course further examines the most common and critical programming flaws inherent to the Java language and platform, as well as web-related vulnerabilities. In addition to typical coding mistakes made by Java developers, the introduced security issues encompass language-specific problems and those arising from the runtime environment. Each vulnerability and associated attack vector is illustrated through clear, easy-to-follow exercises, followed by recommended coding practices and effective mitigation strategies.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them
- Comprehend security concepts specific to web services
- Learn how to leverage various security features within the Java development environment
- Acquire practical knowledge of cryptography
- Understand security solutions available in Java EE
- Identify typical coding errors and learn how to avoid them
- Gain insight into recent vulnerabilities affecting the Java framework
- Develop practical skills in using security testing tools
- Access resources and further reading materials on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Blockchain: Hyperledger Indy for Identity Management
14 HoursIn this instructor-led, live training in Uzbekistan (online or on-site), participants will learn how to build an Indy-based decentralized identity system.
By the end of this training, participants will be able to:
- Create and manage decentralized, self-sovereign identities using distributed ledgers.
- Enable interoperability of digital identities across domains, applications, and silos.
- Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, and more.
- Use Indy to empower identity owners to independently control their personal data and relationships.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Uzbekistan (online or on-site) is designed for system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security using multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led live training in Uzbekistan (online or onsite) is designed for system administrators who wish to use OpenAM to manage identity and access controls for web applications.
Upon completion of this training, participants will be able to:
- Configure the required server environment to begin setting up authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Leverage federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across various systems and applications.
- Access and manage authentication, authorization, and identity services via REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led live training in Uzbekistan (available online or on-site) is targeted at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.