Buy Now 200

Certified CyberSecurity Foundation (CCSF)

About Certification

GSDC's Cybersecurity Foundation Certification is designed with the vast knowledge of the global perspective of challenges that one faces while mapping a secure system while covering the major cyber roles needed to provide a solid system. With all the hacking and data manipulation, cybersecurity has become a need of the hour now. By going through this certification, you will learn about threat trends that are most alarming across the internet currently as well as their impact on cybersecurity. Cybersecurity Foundation Certification empowers you to review standard cybersecurity terminology and compliance requirements, examine sample exploits, and to gain practical experience of security controls.

In addition to technical cybersecurity components, this certification includes the nontechnical aspects of cybersecurity that are necessary to reduce risk like risk management, threat determination, disaster recovery, security policy management, and business continuity planning. In a nutshell, by taking up this certification you'll be armed to reduce any potential cyber risk.

Certification badge for Blockchain expert
 

Objectives

The objective of the Cybersecurity Foundation includes a deep understanding of:

  1. Current cyber threats and cybersecurity site references
  2. Government-mandated directives and compliance requirements
  3. Roles that are required to successfully design secure systems
  4. The attack cycle execution by malicious hackers
  5. Enterprise policy requirements
  6. Best strategies to secure the enterprise with layered defenses
  7. Security zones and detailed logging augment information assurance
  8. Forensic challenges and incident response planning
  9. Risk management process
  10. Industry recommendations for maintaining secure access control
  11. Cryptographic solutions for securing communications

 

Target Audience

about-us

Network professionals

Security professionals

Executives and managers who want to implement a security solution at the organizational level

IT professionals who want to know about cybersecurity fundamentals, threats, mitigating controls, and organizational responsibilities

Anyone who is looking forward to starting a career in cybersecurity.

 

Benefits

Few benefits of getting a cybersecurity certification are:

Increasing demand for certified professionals in this field.

Organizational value

Flexibility in career choices.

Higher salary package.

Helps you to stay updated about the latest cybersecurity tools and trends.

Easy recognition of the designation anywhere across the world

 

Pre-requisites

There are no prerequisites for this certification. But the participants must belong to an IT background.

 

Examination

Ensure that you have filled up the basic details.
This exam consists of 40 multiple-choice questions.
Candidates need to score a minimum of 65% of the total marks (i.e. 26 out of 40) to pass this examination.
The total duration of this examination is 90 minutes.
Candidate should Tick against only one correct answer in Multiple Choice Questions.
There is no negative marking system applicable to this examination.
In case the participant does not score passing % then they will be granted a 2nd attempt at no additional cost. Re-examination can be taken up to 30 days from the date of the 1st exam attempt.

 

Sample Certificate

 

Exam Syllabus

1. Introduction to Cyber Security Management

  • Concepts and definitions
  • Benefits and requirements of Cyber security
2.Introduction to Information Risk Management
  • Information risk management terminology
  • Risk management in the business context
  • Information risk management fundamentals
3.Introduction to Business Continuity Management
  • Need for business continuity management
  • Business continuity management in the business
  • Business continuity lifecycle

4.Cyber Security Architecture

  • Concepts of Cyber Security Architecture
  • The Role of a Security Architect
  • Security Design Principles
5.Soft Skills and Incident Management
  • Topics and Learning Outcomes
  • Engagement lifecycle management
  • Advantages and utility of incident response to the client.
  • Awareness potential incidents.
  • Structure of incident response engagements, including the relevant processes and procedures.
  • Understanding limitations of system logs.
  • Timelines to analyse event data
  • Time zone issues
  • System interpretation of timestamps with images
6.Law & Compliance
  • Regulation of Investigatory Powers Act 2000
  • Criminal Justice Act 2008
  • Protection of Children Act 1978
  • Computer Misuse Act 1990
  • Human Rights Act 1998
  • Data Protection Act 1998
  • Police and Justice Act 2006
  • Sexual Offences Act 2008
  • Engaging law enforcement
  • CERTS and their role and jurisdiction


Download PDF

295 Turnpike Rd block 519, Westborough, MA 01581, USA
Hohenstieglen 6, 8152 Glattbrugg, Switzerland +41 41444851189
10 Anson Road #16-16 International Plaza, Singapore 079903