Cyber Security Strategic Intelligence Professional (CSSI)

Have a question about the course?
Chat with an Education Officer or Email:

Select Your Preferred Batch Below:

This product is currently out of stock and unavailable.

SKU: N/A Category: Tag:


  • Duration: 5 Day / 40 Hours
  • Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination
  • Who Should Attend: Network Engineer, System Analyst, CSO, CISO, Software Engineer, Technologist, System Engineer IT Professionals, and Anyone interested in acquiring the advanced knowledge and skills in Cyber Security Strategic Intelligence.

Course Objective

Acquire advanced knowledge and skills on Cyber Security Strategic Intelligence and how to uncover hidden data insights to safeguard organization cyber assets

Learn the core components on how to perform analytics mining on Cyber Security data to understand the Cyber Security trends and predict potential future threats.


No pre-requisite. Cyber Security Strategic Intelligence Professional (CSSI) is suitable for anyone who is interested in Cyber Security Strategic Intelligence and does not have any prior technological experience


Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security Strategic Intelligence based on the syllabus covered

Course Outline

Module 1
Introduction to Cyber Security Strategic Intelligence

Topics Covered

  • What is Cyber Security Strategic Intelligence?
  • Importance of Risk Management in Cyber Security
  • Dynamic Business Models in the Digital Economy
  • Risk Analysis to Access and Avoid Cyber Security Threats
  • Corporate Governance and Strategies for Cyber Assets
  • Cyber Asset Governance Best Practices and Framework
  • Understanding Data Governance for Cyber Security

Module 2
Cyber Security Landscape and Impact on IT Infrastructure

Topics Covered

  • Classification of Threats and Threats Profile
  • Implementation of Threat Modelling
  • Understanding the Risk of Reconnaissance and Social Engineering
  • What are Malware Attacks?
  • Introduction to System and Network Attacks
  • Remote and Web-based Attacks
  • DoS / DDoS Attack
  • Mobile Security, Cloud Security and Vitalization Security
Module 3
Identity and Access Management Techniques

Topics Covered

  • Threats to Identity and Access
  • Techniques to Command-and-Control Access
  • Investigating Issues Relating to Host, Service and Application
  • Defining Responsibility of Cyber Assets Utilization
  • Physical and Logical Access Control
  • Understand the User Life Cycle
Module 4
Performing Cyber Security Audits

Topics Covered

  • Introduction to Cyber Security Audits, Standards and Guidelines
  • Auditing of Business Processes and Control Objectives
  • What is Audit Planning and Management?
  • Auditing of Security and Privacy Policies
  • Regulatory Compliance Frameworks
  • Security Control Verification and Quality Controls
Module 5
Python Programming for Cyber Security Professionals

Topics Covered

  • Understanding the Basics of Python Programming
  • Application of Python Programming for Cyber Security
  • Functions, Classes, and Modules in Python
  • Common Python Libraries for Data Analytics and Cyber Security
  • Importing and Exporting of Data in Python
  • Data Pre-processing and Cleaning in Python
  • Data Visualization in Python
  • Cyber Security Data Analytics Process using Python

Module 6
Intelligence Data Collection and Analysis

Topics Covered

  • Understanding the Vulnerability Management Plan
  • Different Types and Phases of Vulnerability Assessment
  • Conducting of Vulnerability Assessment Scans
  • Analysing of Vulnerability Assessment Results and Reports
  • Deployment of Security Intelligence Collection and Analysis Platform
  • Collect Data from Network-based Intelligence Sources
  • Collection of Data from Host-Based Intelligence Sources

Module 7
Performing Cyber Asset and Network Analysis

Topics Covered

  • Introduction to Tools for Log Analysis
  • Incident Analysis with Windows Based Tools
  • Performing Malware Analysis
  • Identifying Indicators of Compromise
  • End User Computing Security
  • Crisis Management Handling
  • Security Issues for Applications

Module 8
Business Continuity Processes and Incident Investigation

Topics Covered

  • Designing a Disaster Recovery Plan and Business Continuity Process
  • What is Business Impact Analysis?
  • Preparing a Forensic Investigation Plan
  • Securely Collect and Analyse Evidence
  • Analysing Symptoms for Incident Response
  • Recovery and Post Incident Response
  • Incident Eradication and Recovery

Module 9
Predicting Cyber Threats using Python

Topics Covered

  • Spam Detection with Perceptron and SVMs
  • Phishing Detection with Logistic Regression Models
  • Classification and Detection of Malware Threat
  • Techniques for Network Anomaly Detection and Classification
  • Identification and Prevention of Authentication Abuse

Module 10
Penetration Testing using Artificial Intelligence

Topics Covered

  • Understanding the Key Requirements to Perform Penetration Testing
  • CAPTCHA breaker
  • Using Neural Network-assisted Fuzzing
  • What is DeepExploits?
  • Web Vulnerability Scanner Using Artificial Intelligence
  • Malicious URL Detection with Artificial Intelligence
  • Deep Learning Based Automation Detection


Some Reasons Why Learners Choose CASUGOL

  • International Certification Body

  • Presence in 38 Countries

  • Developed by Industry Experts

  • More than 42,000 professionals passed through our education system

  • Flexible program design for all individuals

  • Learn from internationally renowned leading industry experts, academics, and researchers

  • Support for participants during and after training

  • Enhance competency of workforce and improve individual career prospect

  • Customization of programs for specific industry, organization, government agencies, statutory boards

  • Learn in a highly interactive, supportive and encouraging environment

  • Regular invitation to attend courses / workshops / seminars / events at complimentary rate

How to Register

Individual or Self-Sponsored Learners

  • STEP ONE: Select your preferred batch / category above

  • STEP TWO: Click on Add to Cart

  • STEP THREE: In the pop-up page, click on View Cart

  • STEP FOUR: In the Cart page, click on Proceed to Checkout

  • STEP FIVE: In the Checkout page, complete the Billing Details and click on Place Order

For corporate-sponsored participants, batch registration, or any questions on the course
Chat with an Education Officer

Certificate Verification

Certificate Verification

All certificates issued by CASUGOL are to individuals who have successfully completed CASUGOL Certification Programs / Executive Workshops and have fulfilled all requirements by demonstrating proficiency in applying the knowledge and skills acquired.

Click below to verify certificate