Cyber Security Body of Knowledge (CyBOK) Training Course
CyBOK provides a structured framework for establishing foundational and standardized knowledge in the field of cyber security. It seeks to integrate cyber security into common academic curricula and industry training programs by mapping the core knowledge areas defined in the CyBOK.
This instructor-led live training (available online or onsite) is designed for software engineers and IT professionals aiming to deepen their understanding of CyBOK and enhance both their theoretical and practical cyber security skills.
Upon completion of this training, participants will be able to:
- Comprehend the fundamental concepts, definitions, and principles of cyber security.
- Develop in-depth expertise in cyber security by applying the CyBOK knowledge areas.
- Acquire comprehensive foundational knowledge to effectively implement the CyBOK framework in practice.
- Support community and organizational initiatives that prioritize data security and privacy.
- Identify new opportunities to achieve specialization and earn credentials for cyber security careers.
Format of the Course
- Interactive lectures and group discussions.
- Extensive exercises and practical practice.
- Hands-on implementation within a live-lab environment.
Course Customization Options
- The course primarily utilizes open-source tools, which will be tailored to your operating system (Windows, Linux, Mac, mobile devices, etc.) and specific organizational requirements. Please contact us to arrange.
- For requests for customized training, please contact us to arrange.
Course Outline
Introduction
- Overview of cyber security concepts and definitions
- Understanding the CyBOK knowledge areas (KAs)
- Applying CyBOK knowledge to address security challenges
Human, Organisational, and Regulatory Aspects
- Risk management and governance
- Law and regulation
- Human factors
- Privacy and online rights
Attacks and Defences
- Malware and attack technologies
- Adversarial behaviors
- Security operations and incident management
- Forensics
Systems Security
- Cryptography
- Operating systems and virtualisation
- Distributed systems security
- Formal methods for security
- Authentication, authorization, and accountability
Software Platform and Security
- Software security
- Web and mobile security
- Secure software lifecycle
Infrastructure Security
- Applied cryptography
- Network security
- Hardware security
- Cyber-physical systems security
- Physical layer and telecommunications security
Summary and Next Steps
Requirements
- A basic understanding of cyber security and software engineering
Audience
- Software engineers
- IT professionals
Open Training Courses require 5+ participants.
Cyber Security Body of Knowledge (CyBOK) Training Course - Booking
Cyber Security Body of Knowledge (CyBOK) Training Course - Enquiry
Cyber Security Body of Knowledge (CyBOK) - Consultancy Enquiry
Testimonials (2)
I enjoyed the hands on labs because they were engaging and very knowledge sharing
Sinoxolo - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
The huge amount of new information/knowledge I gained from this training!
David - Vodacom
Course - Cyber Security Body of Knowledge (CyBOK)
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at sysadmins who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
ABAP Secure code
14 HoursUpon completion of this training, participants will be able to:
- Explain application security concepts and common vulnerabilities
- Describe ABAP programming best practices and the proper handling of SY-SUBRC
- Understand injection vulnerabilities
- Describe security testing tools
- Explain ATC and CVA
Course Format
- Interactive lectures and discussions
- Extensive exercises and practice sessions
- Hands-on implementation in a live-lab environment
Active Directory for Admins
21 HoursThis instructor-led, live training in Serbia (online or on-site) targets system administrators aiming to use Microsoft Active Directory for managing and securing data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Establish a domain and define access rights for users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Applications Security Foundation
21 HoursThis course addresses the essential secure coding topics pertinent to a broad range of web application developers. It educates participants on the principles of secure programming by examining specific code samples, identifying security vulnerabilities, and implementing effective remediation strategies.
Throughout the course, students will observe demonstrations of real-world attacks and learn how to prevent them, building the confidence needed to enhance the security posture of their applications.
Duration: 3 days
Target Audience: Developers seeking to deepen their expertise in secure coding practices.
Learning Outcomes
• Participants will acquire knowledge in:
• Web Application Security.
• Common Web Application Risks.
• Penetration Testing of Demo Web Applications.
• Data Validation.
• Authentication.
• Session Management.
• Secure SDLC.
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. While it offers a wide array of security features designed to facilitate the development of secure software, it also lacks certain security elements found on other handheld platforms. This course provides a comprehensive overview of these features, highlighting critical shortcomings related to the underlying Linux infrastructure, the file system, and the general environment. Additionally, it addresses issues associated with using permissions and other Android software development components.
The course outlines typical security pitfalls and vulnerabilities affecting both native code and Java applications, offering recommendations and best practices to prevent and mitigate them. Many discussed issues are supported by real-life examples and case studies. Finally, we provide a brief overview of how to utilize security testing tools to identify security-related programming bugs.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding.
- Learn about security solutions available on Android.
- Understand how to utilize various security features of the Android platform.
- Gain insight into recent vulnerabilities in Java on Android.
- Learn about common coding mistakes and strategies to avoid them.
- Develop an understanding of native code vulnerabilities on Android.
- Recognize the severe consequences of insecure buffer handling in native code.
- Comprehend architectural protection techniques and their potential weaknesses.
- Access sources and further reading materials on secure coding practices.
Audience
Professionals
Network Security and Secure Communication
21 HoursBuilding secure networked applications can be challenging, even for developers who have previously worked with various cryptographic components (such as encryption and digital signatures). To help participants grasp the role and application of these cryptographic primitives, the course begins by establishing a strong foundation on the core requirements of secure communication: secure authentication, integrity, confidentiality, remote identity verification, and anonymity. It also addresses common threats that compromise these requirements and presents practical, real-world solutions.
As cryptography is a cornerstone of network security, the course examines essential algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on complex mathematical theory, these topics are explored from a developer's perspective, highlighting typical use cases and practical considerations, such as public key infrastructures. The course also introduces security protocols across various domains of secure communication, with a detailed analysis of widely adopted protocol families like IPSEC and SSL/TLS.
Common cryptographic vulnerabilities are discussed, covering both specific algorithms and protocols. Examples include BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each vulnerability, the course outlines practical implications and potential consequences, again avoiding deep mathematical derivations.
Finally, given that XML technology is central to data exchange in networked applications, the course covers XML security. This includes the use of XML in web services and SOAP messages, alongside protection mechanisms like XML Signature and XML Encryption. It also addresses weaknesses in these protections and XML-specific security issues, such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses across different OSI layers
- Gain a practical understanding of cryptography
- Understand essential security protocols
- Understand recent attacks against cryptosystems
- Gain information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursOver the course of three days, this program explores the fundamental principles of safeguarding C/C++ code against potential exploits by malicious actors. Participants will learn how to mitigate risks associated with memory management and input handling, while mastering the core tenets of writing robust and secure software.
Advanced Java Security
21 HoursEven seasoned Java programmers do not necessarily master all the security services provided by Java, nor are they always aware of the vulnerabilities relevant to Java-based web applications.
Besides introducing the security components of the Java Standard Edition, this course addresses security issues in the Java Enterprise Edition (JEE) and web services. The discussion of specific services begins with the foundations of cryptography and secure communication. Various exercises cover declarative and programmatic security techniques in JEE, while the course also discusses transport-layer and end-to-end security for web services. Participants will apply all components through practical exercises, allowing them to experiment with the discussed APIs and tools firsthand.
The course also reviews and explains the most common and severe programming flaws in the Java language and platform, as well as web-related vulnerabilities. In addition to typical bugs made by Java developers, the security vulnerabilities covered include both language-specific issues and problems arising from the runtime environment. All vulnerabilities and the corresponding attacks are demonstrated through easy-to-understand exercises, followed by recommended coding guidelines and possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and know how to avoid them
- Understand security concepts of web services
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Understand security solutions in Java EE
- Learn about typical coding mistakes and how to avoid them
- Gain information about recent vulnerabilities in the Java framework
- Acquire practical knowledge in using security testing tools
- Access sources and further reading on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
Both the Java programming language and the Java Runtime Environment (JRE) were designed to eliminate the most problematic common security vulnerabilities found in other languages, such as C and C++. However, software developers and architects must do more than simply learn how to leverage the positive security features of the Java environment; they must also remain vigilant regarding the numerous vulnerabilities that continue to impact Java development (negative security).
Before introducing security services, the course provides a concise overview of cryptographic foundations, establishing a common baseline for understanding the purpose and operation of applicable components. The practical application of these components is demonstrated through several hands-on exercises, allowing participants to experiment with the discussed APIs firsthand.
The curriculum also examines and explains the most frequent and severe programming flaws inherent to the Java language and platform, addressing both typical errors made by Java programmers and issues specific to the language and its environment. All vulnerabilities and relevant attack vectors are illustrated through accessible exercises, followed by recommended coding guidelines and potential mitigation strategies.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Identify web vulnerabilities beyond the OWASP Top Ten and learn how to avoid them
- Learn to utilize various security features within the Java development environment
- Gain a practical understanding of cryptography
- Identify typical coding mistakes and learn how to prevent them
- Learn about some recent vulnerabilities in the Java framework
- Access sources and further reading on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led live training in Serbia (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Serbia (online or onsite) is designed for system administrators who wish to utilize Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Serbia (online or onsite) is designed for intermediate-level system administrators and IT professionals who want to learn how to install, configure, manage, and secure LDAP directories using OpenLDAP.
Upon completion of this training, participants will be able to:
- Grasp the structure and operational mechanics of LDAP directories.
- Install and configure OpenLDAP across various deployment environments.
- Implement essential access control, authentication, and replication mechanisms.
- Integrate OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Serbia (online or on-site) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.