OVERVIEW

This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking.

It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) infrastructures.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.  

WHAT YOU WILL LEARN

  • Apply information security standards to their organization and its critical assets
  • Information security risk management framework and methodologies
  • Identifying and modeling information security risks
  • Identify the threats presented by viruses, malware, active code, and Active Persistent Threats (APT) and consider the different mitigating options
  • Formulate and manage effective cybersecurity teams
  • Apply the Computer Security Incident Response Team (CSIRT) framework, tools, and capabilities to deliver cost-effective and robust solutions to protect the organization
  • Discuss current events in the technology space in relation to risk management decisions
  • Use Neuro Linguistic Programing (NLP) to deliver messages that will change the way employees work and think about security
  • Qualitative and quantitative risk assessment methods
  • Articulating information security risks as business consequences
  • Illustrate how penetration testing and ethical hacking enhance organizational security
  • Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence
  • Understand the foundations of Risk Management in the cybersecurity and information technology field
  • Be able to use quantitative risk measurement techniques when discussing networks and projects

WHO SHOULD ATTEND

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.

REGISTER NOW

Our Upcoming Trainings

SME Banking Masterclass
SME Banking Masterclass
Asset & Liability Management
Asset & Liability Management
Digital Banking Leadership
Digital Banking Leadership
Product Management and Development for Retail Banks
Product Management and Development for Retail Banks

Our Happy Clients