Cyber Security: Information Security & Risk Management Masterclass
We provide platform for Public training, In-house, to all clients and individual who seek to learn and educate.
Course Overview
This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking.
It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) infrastructures.
As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.
BENEFITS OF ATTENDING
- Apply information security standards to their organization and its critical assets
- Information security risk management framework and methodologies
- Identifying and modeling information security risks
- Identify the threats presented by viruses, malware, active code, and Active Persistent Threats (APT) and consider the different mitigating options
- Formulate and manage effective cybersecurity teams
- Apply the Computer Security Incident Response Team (CSIRT) framework, tools, and capabilities to deliver cost-effective and robust solutions to protect the organization
- Discuss current events in the technology space in relation to risk management decisions
- Use Neuro Linguistic Programing (NLP) to deliver messages that will change the way employees work and think about security
- Qualitative and quantitative risk assessment methods
- Articulating information security risks as business consequences
- Illustrate how penetration testing and ethical hacking enhance organizational security
- Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence
- Understand the foundations of Risk Management in the cybersecurity and information technology field
- Be able to use quantitative risk measurement techniques when discussing networks and projects
WHO SHOULD ATTEND
IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.
IN-HOUSE
Our Tailored Learning Offering
Do you have five or more people interested in attending this course? Do you want to tailor it to meet your company’s exact requirements? If you’d like to do either of these, we can bring this course to your company’s office by offering our classroom program or LIVE Online. You could even save up to 50% on the cost of sending delegates to a public course and dramatically increase your ROI.
Top Quality
From the Boardroom to the front line, we can deliver engaging, multi-faceted learning programmes that will nurture the skills needed to fast-track development and enable teams to flourish.
Best Way
We combine the right blend of formal, informal, online and classroom techniques to increase your employees’ knowledge retention, drive collaboration, and create social learning communities.