Outstanding Cyber Security Training/Awareness Initiative
NPCC National Cybercrime Programme
The NPCC Cybercrime Training Programme provides police forces in England and Wales with the skills needed to be able to respond to a report of cybercrime and fully investigate any criminal activity, prosecute offenders where necessary but also divert individuals on the cusp of criminal activity on to productive paths. The Programme gives staff the technical skill to advise and protect individuals and organisations in cyber security to help better protect themselves against cybercrime.
Course overview
The Protect & Prepare course is 5-days long and has been designed to give delegates the necessary skills to help organisations protect themselves against a cyber-attack. The course is based around the CompTIA Sec+ (601) accreditation, which is a well-respected industry qualification in cyber security.
The course is suitable for officers and staff who:
- Have successfully completed the NPCC Cybercrime Computing and Networking Foundation Course
- Know the function and basic features of the components of a PC
- Use Windows to create and manage files and use basic administrative features
- Operate the Linux OS using basic command-line tools.
- Know basic network terminology and functions
- Understand TCP/IP addressing and core protocols
Learning outcomes
This course will teach the fundamental principles of installing and configuring cybersecurity controls and participating in incident response and risk mitigation.
- Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
- Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
- Implement secure network architecture concepts and systems design
- Install and configure identity and access services, as well as management controls
- Implement and summarize risk management best practices and the business impact
- Install and configure wireless security settings and implement public key infrastructure
Course modules
Module 1 – Threats, Attacks, and Vulnerabilities
- Indicators of Compromise
- Exercise - VM Orientation
- Malware - Types
- Critical Security Controls
- Exercise - Using Vulnerability Assessment Tools
- Security Posture Assessment Tools
- Exercise - Using Network Scanning Tools 1
- Exercise - Using Network Scanning Tools 2
- Exercise – Using Steganography Tools
- Incident Response
Module 2 – Identity and Access Management
- Cryptography
- Exercise - Implementing Public Key Infrastructure
- Exercise - Deploying Certificates and Implementing Key Recovery
- Identification and Authentication
- Exercise - Using Password Cracking Tools
- Identity and Access Services
- Account Management
- Exercise - Using Account Management Tools
Module 3 – Architecture and Design (1)
- Secure Network Design
- Exercise - Implementing a Secure Network Design
- Firewalls and Load Balancers
- Exercise - Implementing a Firewall
- IDS and SIEM
- Exercise - Using an Intrusion Detection System
- Secure Wireless Access
- Physical Security Controls
Module 4 – Architecture and Design (2)
- Secure Protocols and Services
- Exercise - Implementing Secure Network Addressing Services
- Exercise - Configuring a Secure Email Service
- Secure Remote Access
- Exercise - Implementing a Virtual Private Network
- Secure Systems Design
- Secure Mobile Device Services
- Secure Virtualization and Cloud Services
Module 5 – Risk Management
- Forensics
- Exercise - Using Forensic Tools
- Disaster Recovery and Resiliency
- Risk Management
- Secure Application Development
- Exercise - Identifying a Man-in-the-Browser Attack
- Organisational Security
Exam details
End of Course Exam
- Online proctored exam taken post course
- Duration - 90 minutes
- Questions 90, multiple choice
- Passing score of 750 out of 900 possible points