|
Welcome & Orientation: Welcome!, Introduction, Format & Overview, Course Policies & Enrollment Agreement, What to Expect, Welcome to ACSMI Advanced Cybersecurity & Management Training! |
Navigate platform/support; understand structure/timelines/assessments; review policies & completion requirements; set learning goals; use labs/forums/helpdesk. |
Cybersecurity Instruction; Cybersecurity Curriculum Development; Cybersecurity Workforce Management |
|
Ch 1: Foundations of Cybersecurity: Introduction to Cybersecurity, History of Cybersecurity, Cybersecurity Terminology, Cyber Threat Landscape, Emerging Threats and Technologies, Cybersecurity Frameworks, Cybersecurity Policies and Governance, Risk Management in Cybersecurity, Legal and Ethical Issues in Cybersecurity, Cybersecurity Standards and Compliance, Cybersecurity in Government, Cybersecurity in Finance, Cybersecurity in Healthcare, Cybersecurity in Retail, Cybersecurity in Education, Cybersecurity in Small and Medium Enterprises (SMEs), Practical Application for Foundations of Cybersecurity |
Define principles/terms/history; map threats & emerging tech; apply NIST/ISO/COBIT to governance; perform risk assessment & threat modeling; apply legal/ethical/compliance across sectors; simulate foundational controls. |
Cybersecurity Policy and Planning; Systems Security Management; Security Control Assessor; Technology Program Auditor; Cybersecurity Legal Advice; Privacy Compliance |
|
Ch 2: Information Security and Data Protection: Information Security Management, Data Protection and Privacy, Security Metrics and Reporting, Access Control Mechanisms, Identity and Access Management (IAM), Authentication and Authorization, Cryptography Basics, Public Key Infrastructure (PKI), Advanced Cryptography, Secure Development for IoT Devices, Cybersecurity in Insurance, Cybersecurity in Real Estate Transactions, Cybersecurity in Real Estate Supply Chain Management, Cybersecurity in Logistics and Transportation, Practical Application for Information Security and Data Protection |
Build ISMS (ISO 27001); implement privacy controls (GDPR/CCPA); design IAM (MFA/RBAC/SSO); apply crypto & PKI; secure IoT development; define/report KPIs; address sector data-protection challenges. |
Privacy Compliance; Systems Security Management; Security Control Assessor; Systems Administrator; Systems Security Analyst; Secure Software Developer; Software Security Assessor |
|
Ch 3: Network Security and Infrastructure Protection:Network Security Fundamentals, Cybersecurity Architecture, Firewalls and Network Security Devices, Intrusion Detection and Prevention Systems (IDPS), Virtual Private Networks (VPNs), Wireless Security, Zero Trust Architecture, Network Traffic Analysis, Network Segmentation and Isolation, Advanced Firewall Configurations, IPv6 Security Considerations, Wireless Intrusion Prevention Systems (WIPS), Advanced VPN Configurations, Cybersecurity in 5G Networks, Cybersecurity in Telecommunications |
Design layered defenses & ZTA; configure firewalls/IDPS/WIPS/VPN; analyze traffic & detect anomalies; segment/isolate networks; harden IPv6; secure wireless and 5G/telecom infrastructure. |
Cybersecurity Architect; Network Operations Specialist; Cyber Defense Analyst; Infrastructure Support Specialist; Systems Security Analyst |
|
Ch 4: Endpoint and Application Security: Endpoint Security, Application Security, Web Security, Mobile Security, Cloud Security, IoT Security, Industrial Control Systems Security, Cybersecurity in Wearable Technology, Cybersecurity in Smart Appliances, Cybersecurity in Smart Buildings, Cybersecurity in Smart Retail, Cybersecurity in Smart Transportation, Cybersecurity in Smart Cities, Cybersecurity in Smart Nations |
Deploy EDR/XDR; secure SDLC; perform SAST/DAST & remediate OWASP Top 10; secure mobile/cloud/containers/serverless; harden ICS/SCADA; secure large IoT ecosystems for smart environments. |
Cyber Defense Analyst; Systems Administrator; Secure Software Developer; Software Security Assessor; Secure Systems Developer; OT Cybersecurity Engineer |
|
Ch 5: Threat Intelligence and Threat Hunting: Threat Intelligence and Analysis, Advanced Threat Detection, Advanced Persistent Threats (APTs), Cybersecurity in Machine Learning, Red Teaming and Blue Teaming, Purple Teaming, Cyber Threat Intelligence Platforms, Advanced Threat Hunting, Cybersecurity in Augmented Reality (AR) and Virtual Reality (VR), Cybersecurity in Virtual Reality (VR), Cybersecurity in Mixed Reality (MR), Cybersecurity in Extended Reality (XR), Cybersecurity in Robotics |
Collect/analyze CTI (OSINT/dark web/feeds); develop hunting playbooks (Sigma/YARA/ML); simulate APT kill chains (red/blue/purple); integrate TIP/CTI into SOAR; secure XR/robotic systems. |
Threat/Warning Analyst; Cyber Defense Analyst; Data Analyst; Insider Threat Analyst; Cybersecurity R&D Specialist |
|
Ch 6: Incident Response and Digital Forensics: Incident Response and Management, Security Operations Center (SOC) Management, Digital Forensics, Memory Forensics, Network Forensics, Mobile Device Forensics, Email Forensics, Cloud Forensics, Cybersecurity in Healthcare Research, Cybersecurity in Pharmaceutical Industry, Cybersecurity in Medical Devices, Cybersecurity in Telemedicine, Cybersecurity in Health Information Systems, Cybersecurity in Genomics, Cybersecurity in Personalized Medicine, Cybersecurity in Clinical Trials |
Build IR plans & comms trees (NIST 800-61); run SOC workflows with SIEM/ticketing; acquire/analyze forensic artifacts (disk/memory/network); investigate mobile/email/cloud; handle healthcare/pharma/med-device IR scenarios. |
Incident Responder; Digital Forensics Analyst; Digital Evidence Analyst; Systems Security Analyst; Cybercrime Investigator |
|
Ch 7: Malware Analysis and Reverse Engineering: Malware Analysis, Advanced Malware Analysis, Reverse Engineering, Advanced Malware Reverse Engineering, Cybersecurity in Biotechnology, Cybersecurity in Nanotechnology, Cybersecurity in Quantum Computing, Cybersecurity in Blockchain Applications, Cybersecurity in Cryptocurrency, Cybersecurity in Smart Contracts, Cybersecurity in E-commerce, Cybersecurity in Digital Payments |
Analyze malware (sandbox/API tracing/deobfuscation); reverse engineer binaries (Ghidra/IDA); unpack packers; analyze smart contracts & wallet exploits; secure quantum/biotech contexts; protect e-commerce/payment code paths. |
Threat/Warning Analyst; Digital Forensics Analyst; Cybersecurity R&D Specialist; Software Security Assessor; Vulnerability Analyst |
|
Ch 8: Ethical Hacking and Penetration Testing: Penetration Testing, Web Application Hacking, Hacking Mobile Applications, Wireless Network Penetration Testing, IoT Device Hacking, Bug Bounty Programs, Comprehensive Reconnaissance Techniques, Password Cracking Tools, Network Mapping and Discovery, Web Vulnerability Scanning, Physical Penetration Testing |
Plan PT engagements (PTES/OSSTMM); exploit web/mobile/wireless/IoT; run recon (Nmap/Shodan); crack passwords (Hashcat/John); perform vuln scanning; execute physical testing; responsible disclosure/bug bounty workflows. |
Vulnerability Analyst; Security Tester; Software Security Assessor; Cyber Defense Analyst; Network Operations Specialist |
|
Ch 9: Cloud Security and Virtual Environments: Cloud Security Architecture, Securing Cloud Infrastructure, Identity and Access Management in Cloud, Cloud Security Automation, Cloud File Sharing Security, Cloud Penetration Testing, Business Continuity in the Cloud, Cybersecurity in Environmental Monitoring, Serverless Security, Container Security Fundamentals, Cloud Compliance |
Architect secure cloud networks (VPC/subnets/hybrid); enforce cloud IAM/least privilege/KMS; automate security with IaC + CI/CD gates; secure containers/serverless; conduct cloud PT; align to compliance (SOC 2/ISO 27017). |
Cybersecurity Architect; Network Operations Specialist; Systems Administrator; Infrastructure Support Specialist; Security Control Assessor; Authorizing Official/Designated Rep |
|
Ch 10: Cybersecurity in Industry Sectors: Cybersecurity in Manufacturing, Cybersecurity in Energy and Utilities, Cybersecurity in Transportation, Cybersecurity in Defense and Military, Cybersecurity in Supply Chain Management, Cybersecurity in Maritime Industry, Cybersecurity in Aviation, Cybersecurity in Critical Infrastructure |
Apply OT/ICS standards (IEC 62443); secure SCADA/smart grid; implement supply-chain risk + CMMC/NIST 800-171 alignment; harden aviation/maritime comms; secure mission-critical networks. |
OT Cybersecurity Engineer; Cybersecurity Policy and Planning; Security Control Assessor; Systems Security Manager; Technology Program Auditor; Cybersecurity Architect |
|
Ch 11: Business Continuity and Disaster Recovery: Business Continuity and Disaster Recovery, Advanced Business Continuity Planning, Advanced Disaster Recovery Planning, Cybersecurity in Smart Grids, Cybersecurity in Mergers and Acquisitions, Cybersecurity in Digital Twins |
Create BCP/DRP (ISO 22301); run BIA + tabletops; design geo-redundancy and RTO/RPO; manage M&A integration risk; resilience for smart grids/digital twins. |
Cybersecurity Program Manager; Product Support Manager; Technology Portfolio Manager; Systems Security Manager; Infrastructure Support Specialist |
|
Ch 12: Social Engineering and Human Factors: Advanced Social Engineering Defense, Cybersecurity Awareness and Training, Ethical Considerations in Cybersecurity, Cybersecurity in Law Enforcement, Cybersecurity in Emergency Services, Cybersecurity in Public Safety, Cybersecurity in Museums and Galleries, Cybersecurity in Libraries and Archives, Cybersecurity in Language Services, Cybersecurity in Travel and Tourism, Cybersecurity in Hospitality Management, Cybersecurity in Media and Entertainment, Cybersecurity in Music Industry |
Design phishing simulations & awareness; address human-factor risk & ethics; coordinate with law enforcement/emergency services; protect public/cultural venues; reduce social engineering exposure across service industries. |
Cybersecurity Instructor; Cybersecurity Policy and Planning; Insider Threat Analyst; Cyber Defense Analyst; Cybersecurity Legal Advice |
|
Ch 13: Security Operations and Automation: Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), Advanced SIEM Solutions, Endpoint Detection and Response (EDR) Tools, Intrusion Detection and Prevention Systems (IDPS) Tuning, Cybersecurity Metrics and KPIs, Cybersecurity Program Management, Cybersecurity Budgeting and Resource Allocation, Cybersecurity Vendor Management, Supply Chain Security, Cybersecurity in Smart Healthcare |
Implement/tune SIEM, SOAR, EDR; build playbooks & detections; define KPIs/dashboards; plan budgets; manage vendors/SLAs; assess supply-chain risk; secure healthcare IoMT workflows. |
Cyber Defense Analyst; Systems Security Analyst; Data Analyst; Infrastructure Support Specialist; Systems Security Manager; Technology Portfolio Manager; Technology Program Auditor |
|
Ch 14: Threat Hunting and Proactive Defense: Vulnerability Management, Zero Trust Network Access (ZTNA), Red Team vs Blue Team Scenarios, Purple Team Operations, Cybersecurity in Space Communication, Cybersecurity in Autonomous Systems, Cybersecurity in Unmanned Aerial Vehicles (UAVs), Cybersecurity in Robotics Process Automation (RPA) |
Run vulnerability management lifecycle; implement ZTNA/microsegmentation; execute red/blue/purple exercises; secure autonomous/UAV/space/RPA platforms; iterate proactive defense improvements. |
Vulnerability Analyst; Threat/Warning Analyst; Cyber Defense Analyst; Cybersecurity Architect; Network Operations Specialist; OT Cybersecurity Engineer |
|
Ch 15: Advanced Network and Infrastructure Security:Advanced Network Security, Advanced VPN Management, Intrusion Detection and Prevention (IDPS) Techniques, Advanced Firewall Management, Networking for Cloud Environments, Network Forensics, Securing Wireless Networks |
Apply DPI/SSL inspection concepts; optimize VPN concentrators and auth; tune IDPS; perform network/wireless forensics; harden WPA3/802.1X; secure cloud networking patterns. |
Network Operations Specialist; Cybersecurity Architect; Infrastructure Support Specialist; Cyber Defense Analyst; Digital Forensics Analyst; Systems Security Analyst |
|
Ch 16: Cybersecurity Certifications and Career Paths:Cybersecurity Certifications Overview, CISSP, CEH, CompTIA Security+, GSEC, OSCP, CISM, CISA, CySA+, CCSP, GCFA, GCIH, GPEN, GWEB |
Map certs to roles/goals; create study plans; use labs/practice exams/mentorship; plan CPE/CE maintenance and career progression. |
Cybersecurity Workforce Management; Cybersecurity Curriculum Development; Cybersecurity Instructor; Systems Security Manager |
|
Ch 17: Practical Cybersecurity Skills and Training: CTF Challenges, Practical Red-Team Certifications (CRTO), End-to-End Penetration Test, Incident Response Planning and Execution, Advanced SIEM Management, Practical Machine Learning for Cybersecurity, GIAC Certified Web Application Defender (GWEB), Quantum Computing and Cryptography |
Execute hands-on CTF and red-team ops; run full PT + IR lifecycle; tune SIEM/analytics; apply ML to detection; explore quantum crypto impacts; produce practical artifacts. |
Cyber Defense Analyst; Vulnerability Analyst; Incident Responder; Systems Security Analyst; Data Analyst; Cybersecurity R&D Specialist; Security Tester |
|
Ch 18: Capstone Project and Final Review: Designing a Comprehensive Defense Strategy, Breach Simulation and Mitigation, Building a Cybersecurity Portfolio, Penetration Testing Frameworks, IoT Security Protocols |
Architect/defend a simulated enterprise; lead breach simulation and reporting; compile portfolio (PT/IR/policy artifacts); create IoT security blueprint and hardening plan. |
Cybersecurity Architect; Systems Security Manager; Cyber Defense Analyst; Incident Responder; Vulnerability Analyst; Secure Systems Developer |
|
Ch 19: Cybersecurity in Different Sectors: Cybersecurity in Agriculture, Non-Profit Organizations, Startups, Large Enterprises, Real Estate, Fintech, Digital Payments, Space Exploration, Intelligence Agencies, Biotechnology Research, Agricultural Technology, Food Supply Chain, Water Management, Waste Management, Renewable Energy, Nuclear Energy |
Tailor controls to org maturity/resources; scale architectures from startup to enterprise; secure fintech/payment rails; apply high-assurance security for space/intelligence/biotech; address energy/environment sector risks. |
Cybersecurity Policy and Planning; Systems Security Manager; Security Control Assessor; Cybersecurity Architect; OT Cybersecurity Engineer; Technology Program Auditor |
|
Ch 20: Cybersecurity Technologies and Advanced Techniques: Blockchain Security, Artificial Intelligence in Cybersecurity, Machine Learning for Cybersecurity, Advanced Penetration Testing, Advanced Incident Response, Advanced Digital Forensics, IoT Forensics, Cybersecurity in Autonomous Vehicles, Cybersecurity in Edge Computing, Cybersecurity in Consumer Goods, Cybersecurity in Packaging Industry |
Secure DLT/smart contracts; deploy AI/ML scoring/automation; conduct IoT/edge forensics; harden autonomous vehicle networks; perform advanced PT/IR/DFIR across complex incidents. |
Cybersecurity R&D Specialist; Data Analyst; Software Security Assessor; Vulnerability Analyst; Incident Responder; Digital Forensics Analyst |
|
Ch 21: Certifications and Professional Development: CASP+, GCIA, GCED, GCWN, GCUX, GCIH, GCPM, GPEN, GCFE, GWEB, CISSP Advanced Review, CEH Advanced Review, Advanced CySA+ Prep, Cybersecurity Certification Exam, GIAC Certifications Walkthrough, OSCP Practical Prep, AWS Security Specialty, Azure Security Engineer Pathway, Cloud-Specific Certifications (CCSP) |
Compare advanced cert tracks and recert paths; build exam-focused labs; apply AWS/Azure security best practices; structure multi-cert acceleration plans. |
Cybersecurity Workforce Management; Cybersecurity Curriculum Development; Cybersecurity Instructor; Cybersecurity Program Manager; Cybersecurity Architect; Cyber Defense Analyst |
|
Ch 22: Cybersecurity in Industries and Critical Infrastructure: Oil and Gas, Mining, Chemical Industry, Manufacturing 4.0, Textile Industry, Fashion Industry, Electronics Industry, Automotive Industry, Printing Industry, Publishing Industry, Broadcasting Industry, Film and Television, Theater and Performing Arts |
Secure hazardous ICS/chemical plant controls; protect Industry 4.0 OT/IT integration; secure creative/broadcast pipelines; harden manufacturing lines; manage compliance and supply-chain risks across specialized industries. |
OT Cybersecurity Engineer; Cybersecurity Policy and Planning; Security Control Assessor; Systems Security Manager; Cybersecurity Architect; Technology Program Auditor |
|
Ch 23: Emerging Threats and Advanced Cybersecurity Challenges: Social Engineering and Phishing, Advanced Cybersecurity Case Studies, Advanced Cybersecurity Awareness Training, Cybersecurity in Space Exploration |
Analyze breach case studies/retrospectives; strengthen human-centric defenses; extend training to space-grade missions; build continuous-learning for new threats. |
Threat/Warning Analyst; Cyber Defense Analyst; Cybersecurity Policy and Planning; Cybersecurity Instructor; Insider Threat Analyst |
|
Ch 24: Cybersecurity Certifications and Professional Development (Reprise): GCWN, GCUX, GCIH, GCPM, GCFE, GCIA, GCED, GWEB, CASP+, CISSP Advanced Review, CEH Advanced Review, Advanced CySA+ Prep, Cybersecurity Certification Exam, GIAC Certifications Walkthrough, OSCP Practical Prep, AWS Security Specialty, Azure Security Engineer Pathway, Cloud-Specific Certifications (CCSP) |
Reinforce cert roadmaps; provide advanced prep labs + peer review; align cloud tracks to enterprise needs; ensure exam readiness for GIAC/ISC². |
Cybersecurity Workforce Management; Cybersecurity Curriculum Development; Cybersecurity Instructor; Cybersecurity Program Manager; Cyber Defense Analyst |
|
Ch 25: Emerging Technologies and Advanced Security Concepts: Cybersecurity in Artificial Intelligence, Cybersecurity in Big Data, Cybersecurity in Data Science, Blockchain Security, Securing Cryptocurrency Wallets, Quantum Threats to Cybersecurity, AI in Cybersecurity, Exploitation Techniques, Advanced Red Team Techniques, Post-Exploitation Tactics, Log Analysis with Splunk, Vulnerability Scanning with Nessus, Sandbox Analysis Tools |
Secure AI/ML against poisoning/inference; protect big-data & DS workflows; harden crypto wallets and plan quantum resistance; execute advanced red team & post-exploitation; apply Splunk/Nessus/sandboxing for detection and analysis. |
Cybersecurity R&D Specialist; Data Analyst; Vulnerability Analyst; Software Security Assessor; Threat/Warning Analyst; Cyber Defense Analyst |
|
Ch 26: Cybersecurity in Specialized Systems and IoT:Cybersecurity in Smart Homes, Smart Factories, Smart Agriculture, Smart Cities, Cybersecurity in Augmented Reality (AR), Cybersecurity in 3D Printing, Cybersecurity in Additive Manufacturing, Cybersecurity in Drones, UGVs, UUVs, USVs, Spacecraft, Satellites |
Secure IoT at scale with OT/IT convergence; threat model additive manufacturing and AR; secure autonomous drones/UGV/UUV/USV and satellite comms; perform firmware audits and supply-chain integrity checks. |
OT Cybersecurity Engineer; Secure Systems Developer; Cybersecurity Architect; Infrastructure Support Specialist; Vulnerability Analyst; Threat/Warning Analyst |
|
Ch 29: Digital Forensics and Investigation Techniques:Windows Forensics, Linux Forensics, Memory Forensics, Anti-Forensics Techniques, Mobile Device Forensics, Cloud Forensics, Building Your Digital Forensics Kit, IoT Risk Assessment, IoT Firmware Analysis and Security, IoT Standards and Compliance, Building a Cyber Range, Advanced Report Writing Skills, Career Pathways in Cybersecurity, Cybersecurity Interview Prep |
Perform Windows/Linux forensics; counter anti-forensics & maintain chain of custody; analyze mobile/cloud artifacts; conduct IoT risk and firmware analysis; build cyber range; write actionable reports; prep for interviews and career ladders. |
Digital Forensics Analyst; Digital Evidence Analyst; Cybercrime Investigator; Incident Responder; Security Control Assessor; Knowledge Manager |
|
Ch 30: Cybersecurity Infrastructure and Risk Management:Building Your Own SOC Framework, Capstone Project Presentation, ACSMI Final Exam Review Questions, Advanced Network Design and Architecture, OSINT Tools for Cyber Reconnaissance |
Design and operationalize a SOC; present capstone with exec/technical summaries; run final exam review; design resilient network architectures; use OSINT for proactive recon/intel. |
Systems Security Manager; Cybersecurity Program Manager; Network Operations Specialist; Cyber Defense Analyst; Threat/Warning Analyst; Cybersecurity Policy and Planning |