Intrusions are in the news on a daily basis. Depending on the security benchmark you read, there are thousands of controls that could be deployed to protect your organisation. Consequently, the dilemma for security managers and specialists alike is how to select and implement the more effective controls. Fortunately the Australian Government openly publishes the top “Essential Eight” cyber security strategies that could have thwarted or significantly mitigated the damage from across the range of cyber intrusions they have seen impact government and industry networks.
This course introduces participants to the Australian Signals Directorate’s (ASD) Essential Eight (E8) control strategies. It provides an overview of the implementation, with a special focus of the things to watch for as you prepare for an assessment against the ASD E8.
Requirements
Required background knowledge for E8 implementation.
- Familiarity with:
- Windows operating system administration including PowerShell
- Microsoft Active Directory administration including Group Policy administration.
- Microsoft Intune administration
- Basic cyber security knowledge including threats, vulnerabilities and risks (having completed AUSCERT’s Introduction to Cyber Security for IT Professionals is excellent preparation)
- Please note:
- that a high level of technical knowledge will be required to implement the E8 strategies, however, IT Engineers, IT Managers, Operations team leaders and E8 projects will benefit from this course too as we will provide the context for the E8 strategies. That said, there will be a high level of technical content.
- This is not Microsoft Windows training course, but rather a course that build understanding of the ASD Essential controls, its maturity levels and key aspects of a successful E8 implementation program.
Learning Outcomes
- A solid understanding of the ASD Essential Eight Cyber Security Strategies
- An understanding of the range of options for implementation
- An understanding of the E8 maturity model and how to prepare for an E8 assessment by an ASD certified E8 Assessor
Approach
- We describe and discuss Essential Eight cyber strategies and the context of their publication and application
- We introduce attendees to the technical and a procedural requirements for implementation
- Group discussion of the implementation challenges. We have seen different implementation techniques and we will facilitate the sharing of experiences during this course
- This is not a Windows engineering nor a solution design course
- The course is presented by a certified ASD Essential Eight Assessor (TAFE Cyber)
Curriculum Outline
- The context of the Essential Eight benchmark versus the remainder of your security program
- A detailed examination of details of each of the E8 strategies
- Implementation options for the E8 strategies
- Self assessment against the ASD E8
- Preparation for a formal assessment against the E8 benchmark by an ASD certified Assessor