Why Attend
This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking.
It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) infrastructures.
As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets. All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations.
Course Methodology
The course will include practical sessions, videos as well as live examples [e.g. Virus] and demonstrations of white and black hat hacking tools. All participants will also be provided with the latest research papers and articles.
As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.
Course Objectives
By the end of the course, participants will be able to:
Course Outline
European Quality for Training and Consultancy is certified
ISO 9001-2015
All rights reserved
This site uses cookies. If you continue browsing, you agree to our use of cookies Privacy policy
Agree