Cyber Security Operations Manager

CSOM Self-Study Cyber Security Course

Organizations face ongoing threats to their information technology infrastructure on a daily basis. These security struggles need to be approached with modern techniques, a holistic view of security, and a diverse body of knowledge. With the proper tools and training, managers in the Information Security and Cyber Security fields will be much more capable of finding success within their roles.

The Cyber Security Operations Manager self-study course brings Cyber Security core competencies to advanced levels with new concepts and traditional best practices. Using 16 detailed learning objects, students will be provided with the knowledge and context needed to successfully manage the security of their technical environments. Focusing on the Information Security concerns of today, students will cover topics such as Cloud Security, Threat Intelligence Collection and Analysis, Vulnerability Management, Biometric Security Systems, Incident Response, Securing Systems with Cryptography, and the NICE Cybersecurity Workforce Framework.

Hard Copy Course Materials

CSOM Self-Study Textbook 01
COURSE TEXTBOOK
CSOM Self-Study Textbook 02
COURSE TEXTBOOK
CCSOM Self-Study Workbook
COURSE WORKBOOK
CSOM Self-Study Prep Guide
EXAM PREP GUIDE

Online Course Materials

All Phase2 self-study courses offer the following online resources and/or support:

  • Domain Knowledge Assessment Quizzes
  • Course Workbook and Lab Exercises
  • Exam Prep Guide
  • Lab Images and Files (Applicable Courses)
  • Instructor Support During Enrollment (by Email)

Course Outline and Learning Objectives

  • Overview of the NICE Framework
  • NICE Framework Key Terms
  • NICE Framework Categories
  • NICE Framework Specialty Areas and Work Roles
  • Knowledge, Skills, and Abilities (KSA’s)
  • Implementing the NICE Framework
  • Password Complexity and Policy
  • Tokens, HOTP, and TOTP Controls
  • Biometric and Geolocation Methods
  • Kerberos, NTLM, LDAPS, and Active Directory
  • SSO, SAML, OAuth, and OpenID Connect
  • Access Control Models
  • Biometric Implementation
  • Fingerprint Recognition Systems
  • Facial Recognition Systems
  • Iris and Retinal Imaging Systems
  • Keystroke Dynamics
  • Voice Recognition Systems
  • Providing Integrity with Hashing
  • Symmetric Encryption Characteristics
  • Asymmetric Encryption Characteristics
  • Email: Using Cryptographic Protocols
  • Public Key Infrastructure: Certificates
  • Cryptography Security Threats
  • Security Architecture Frameworks
  • Reference Security Architecture
  • The Secure Development Life Cycle
  • Architectural Design Documentation
  • Architectural Domains: The Four Pillars
  • Zero Trust Networks
  • Baseline Measuring Objectives
  • Network Sensor Deployment
  • Statistical Monitoring
  • Potential Signs of Compromise
  • Indicator of Compromise Verification
  • Event-Based Alert Monitoring
  • 7 Stages of the Attack Life Cycle
  • Effective Incident Remediation
  • Assigning a Remediation Owner
  • Remediation Posturing Actions
  • Eradication Plan Development
  • Plan Timing and Execution
  • Network Forensics vs. Digital Forensics
  • General Process for Performing Analysis
  • Standard Windows Directory Structure
  • Locating Endpoint Data
  • Live Collection Best Practices
  • Live Response: When Things Go Wrong
  • Understanding Elements of Proof
  • Investigative Interview Strategies
  • Investigative Report Writing
  • Incident Scene Management
  • Evidence Dynamics and Chain of Custody
  • Legal Challenges in Digital Investigations
  • Risk Management: Key Definitions
  • The Key Attributes of Risk
  • Risk Management Program Development
  • Risk Management Frameworks
  • Asset Inventories and Resource Profiles
  • Qualitative and Quantitative Analysis
  • Identifying Vulnerabilities and Misconfigurations
  • Nmap (Network Mapper) and Zenmap
  • Security Content Automation Protocol (SCAP)
  • Vulnerability Program Essentials
  • Prioritizing and Rating Vulnerability Levels
  • Establishing an Efficient Workflow
  • BCP and DRP Key Definitions
  • The Benefits of a Business Impact Analysis
  • Business Impact Analysis Data Collection
  • Selecting a BIA Project Manager
  • Writing a BCP / DRP Testing Strategy
  • The 5 Progressions of BCP / DRP Testing
  • Cyber Adversaries vs. Cyber Defenders
  • Components of the Threat Landscape
  • Understanding the Maneuver Warfare Mindset
  • The Threat Intelligence Cycle
  • Challenges to Cyber Crime Investigations
  • Threat Intelligence Sources
  • Cloud Computing Service Models
  • Public, Private, Community, and Hybrid Cloud
  • Cloud Data Security
  • Data Loss Prevention: Egress Monitoring
  • Cloud Platform Risks
  • Lack of Physical Access and Auditing Ability
  • Seeking Best Options Over Fairness
  • General Contract Structures
  • SLA and Contract Review Process
  • General Contract Review Checklist
  • Provisions of an Enforceable Contract
  • Contract Negotiation Strategies
  • Response Playbook Components
  • Building a Response Playbook
  • Common Playbook Response Scenarios
  • Planning Table-Top Exercises
  • Planning Simulated Attacks
  • Sample Playbook: Unauthorized Access

Certificate of Course Completion

A Certificate of Course Completion (shown below) will be available for download in PDF format immediately upon successful completion of the 16 domain knowledge assessment quizzes.  Replacement certificates can be requested by email at any time after the successful completion of the self-study course at no cost.

CSOM Certificate of Course Completion

Course Cost

$1,200.00

Phase2 Advantage offers discounts to non-profit organizations, federal agencies, law enforcement personnel, and the military affiliate community. We also offer group discounts. Email training@phase2advantage.com to see if your organization qualifies for one or more of our discount programs.