Cyber Security Strategic Intelligence Professional (CSSI)

Have a question about the course?
Chat with an Education Officer or Email:

Select Your Preferred Batch Below:

This product is currently out of stock and unavailable.

SKU: N/A Category: Tag:


  • Duration: 5 Day / 40 Hours
  • Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination
  • Who Should Attend: Network Engineer, System Analyst, CSO, CISO, Software Engineer, Technologist, System Engineer IT Professionals, and Anyone interested in acquiring the advanced knowledge and skills in Cyber Security Strategic Intelligence.

Course Objective

Acquire advanced knowledge and skills on Cyber Security Strategic Intelligence and how to uncover hidden data insights to safeguard organization cyber assets

Learn the core components on how to perform analytics mining on Cyber Security data to understand the Cyber Security trends and predict potential future threats.


No pre-requisite. Cyber Security Strategic Intelligence Professional (CSSI) is suitable for anyone who is interested in Cyber Security Strategic Intelligence and does not have any prior technological experience


Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security Strategic Intelligence based on the syllabus covered

Course Outline

Module 1
Introduction to Cyber Security Strategic Intelligence

Topics Covered

  • What is Cyber Security Strategic Intelligence?
  • Importance of Risk Management in Cyber Security
  • Dynamic Business Models in the Digital Economy
  • Risk Analysis to Access and Avoid Cyber Security Threats
  • Corporate Governance and Strategies for Cyber Assets
  • Cyber Asset Governance Best Practices and Framework
  • Understanding Data Governance for Cyber Security

Module 2
Cyber Security Landscape and Impact on IT Infrastructure

Topics Covered

  • Classification of Threats and Threats Profile
  • Implementation of Threat Modelling
  • Understanding the Risk of Reconnaissance and Social Engineering
  • What are Malware Attacks?
  • Introduction to System and Network Attacks
  • Remote and Web-based Attacks
  • DoS / DDoS Attack
  • Mobile Security, Cloud Security and Vitalization Security
Module 3
Identity and Access Management Techniques

Topics Covered

  • Threats to Identity and Access
  • Techniques to Command-and-Control Access
  • Investigating Issues Relating to Host, Service and Application
  • Defining Responsibility of Cyber Assets Utilization
  • Physical and Logical Access Control
  • Understand the User Life Cycle
Module 4
Performing Cyber Security Audits

Topics Covered

  • Introduction to Cyber Security Audits, Standards and Guidelines
  • Auditing of Business Processes and Control Objectives
  • What is Audit Planning and Management?
  • Auditing of Security and Privacy Policies
  • Regulatory Compliance Frameworks
  • Security Control Verification and Quality Controls
Module 5
Python Programming for Cyber Security Professionals

Topics Covered

  • Understanding the Basics of Python Programming
  • Application of Python Programming for Cyber Security
  • Functions, Classes, and Modules in Python
  • Common Python Libraries for Data Analytics and Cyber Security
  • Importing and Exporting of Data in Python
  • Data Pre-processing and Cleaning in Python
  • Data Visualization in Python
  • Cyber Security Data Analytics Process using Python

Module 6
Intelligence Data Collection and Analysis

Topics Covered

  • Understanding the Vulnerability Management Plan
  • Different Types and Phases of Vulnerability Assessment
  • Conducting of Vulnerability Assessment Scans
  • Analysing of Vulnerability Assessment Results and Reports
  • Deployment of Security Intelligence Collection and Analysis Platform
  • Collect Data from Network-based Intelligence Sources
  • Collection of Data from Host-Based Intelligence Sources

Module 7
Performing Cyber Asset and Network Analysis

Topics Covered

  • Introduction to Tools for Log Analysis
  • Incident Analysis with Windows Based Tools
  • Performing Malware Analysis
  • Identifying Indicators of Compromise
  • End User Computing Security
  • Crisis Management Handling
  • Security Issues for Applications

Module 8
Business Continuity Processes and Incident Investigation

Topics Covered

  • Designing a Disaster Recovery Plan and Business Continuity Process
  • What is Business Impact Analysis?
  • Preparing a Forensic Investigation Plan
  • Securely Collect and Analyse Evidence
  • Analysing Symptoms for Incident Response
  • Recovery and Post Incident Response
  • Incident Eradication and Recovery

Module 9
Predicting Cyber Threats using Python

Topics Covered

  • Spam Detection with Perceptron and SVMs
  • Phishing Detection with Logistic Regression Models
  • Classification and Detection of Malware Threat
  • Techniques for Network Anomaly Detection and Classification
  • Identification and Prevention of Authentication Abuse

Module 10
Penetration Testing using Artificial Intelligence

Topics Covered

  • Understanding the Key Requirements to Perform Penetration Testing
  • CAPTCHA breaker
  • Using Neural Network-assisted Fuzzing
  • What is DeepExploits?
  • Web Vulnerability Scanner Using Artificial Intelligence
  • Malicious URL Detection with Artificial Intelligence
  • Deep Learning Based Automation Detection

Some Reasons Why Learners Choose CASUGOL

  • International Certification Body

  • Presence in 38 Countries

  • Developed by Industry Experts

  • More than 42,000 professionals passed through our education system

  • Flexible program design for all individuals

  • Learn from internationally renowned leading industry experts, academics, and researchers

  • Support for participants during and after training

  • Enhance competency of workforce and improve individual career prospect

  • Customization of programs for specific industry, organization, government agencies, statutory boards

  • Learn in a highly interactive, supportive and encouraging environment

  • Regular invitation to attend courses / workshops / seminars / events at complimentary rate

Individual or Self-Sponsored Learners

  • STEP ONE: Select your preferred batch / category above

  • STEP TWO: Click on Add to Cart

  • STEP THREE: In the pop-up page, click on View Cart

  • STEP FOUR: In the Cart page, click on Proceed to Checkout

  • STEP FIVE: In the Checkout page, complete the Billing Details and click on Place Order

For corporate-sponsored participants, batch registration, or any questions on the course
Chat with an Education Officer

Certificate Verification

All certificates issued by CASUGOL are to individuals who have successfully completed CASUGOL Certification Programs / Executive Workshops and have fulfilled all requirements by demonstrating proficiency in applying the knowledge and skills acquired.

Click below to verify certificate

CASUGOL is dedicated to making education, knowledge, and resources accessible to everyone around the world. Our Financial Aid is aimed to empower learners who may encounter financial barriers in pursuit to advance their knowledge and technical know-how.

If you are unable to cover the costs of a course, you have the opportunity to request financial aid via the link found on the course's homepage. Upon approval for financial aid, you will gain full access to all course materials and can successfully complete the course to obtain a certificate.

Have a question with regards to Financial Aid?
Chat with our Education Officer

How to Apply

To apply for financial aid:

  • Step 1: Visit the Course Page and Click on the Apply Financial Aid below the Course Fee
  • Step 2: Fill out the form and submit your application
  • Step 3: Make sure your application meets a maximum of 250 word count
  • Step 4: Wait up to 24 Hours for your application to be reviewed

Upon reviewing your application, you will receive an email notification informing you of the approval or denial status.

What Will I Receive?

If you’re approved for financial aid, you’ll receive a discount off the cost of the course. We offer financial aid to help empower learners who wouldn’t otherwise be able to afford the course fee.

In order to fairly distribute financial aid resources to the learners who need it the most, the amount of financial aid you receive may depend on the details in your application and your geographical location.

Application Status

Approved Applications

Upon approved, you will receive an email letting you know. Please follow the instructions provided in the email to begin your learning journey.

Rejected Applications

In the event that your application is declined, you will receive an email providing an explanation for the denial. If there were any issues with your initial application, you have the option to submit a new application and reapply.

Have a question with regards to Financial Aid?
Chat with our Education Officer