cyber security: information security management best practice.

Learn The Rudiments of cyber security management...

Early Bird Discount Expires In:

Enter your Name, Email and Phone Number below to get your Discount Coupon for this training.

Why Attend?

This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking.

It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) infrastructures.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.  All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations.

What You'll Benefit?

Module 1: Adapting to evolving standards

    • Information security standards (e.g. PCI-DSS/ISO27001)
    • Documented tools:
      • ISO/IEC 27001
      • PAS 555
      • Control Objectives for Information and Related Technology (COBIT)
    • Future standards
      • ISO/IEC 2017
      • EU privacy regulations
      • Local and international government stipulations implicating access to private data

Module 2: Principles of IT security

    • Enterprise security
      • External defenses
      • Web filtering
      • Intruder Prevention Systems (IPS)
      • Intruder Detection Systems (IDS)
      • Firewalls
    • Secure code
    • Software Development Lifecycles (SDL)
    • Potential insecurities within developed applications
    • WiFi security protocols and attributes
    • Voice over IP (VoIP) security
    • Governance Risk and Compliance (GRC)
    • Security Incident Event Management (SEIM) applications
    • Cloud security
    • Third party security and compliance

Module 3: Adopting cyber security measures

    • Employee perception on security through Neuro Linguistic Programing (NLP)
    • Security education and awareness: techniques, systems, and methodologies
    • Penetration testing
    • Ethical hacking
    • Options to mitigate viruses, malware, active code threats and Active Persistent Threats (APT)
    • The Computer Incident Response Team (CSIRT) frameworks, tools and capabilities
    • Incident first response: proven methodologies, tools, and systems
    • The science of applying robust digital forensics: applicable law, capabilities, and methodologies
    • Supervisory Controls and Data Acquisition (SCADA); security requirements, processes and methodologies
    • Abuse images: complying with local and international law

Module 4: Building cyber security teams

    • Creation and management of a Secure Operations Center (SOC)
    • Development of the Corporate Security Organization Framework
    • Formulation and deployment of a Computer Security Incident Response Team (CSIRT)
    • Bespoke Security Incident and Event System (SIEM) for the operational deployment
    • Risks associated with I/O Security (e.g. USBs, CDs, other forms of media)
    • Risks of Active Code Injection, and mitigation techniques

Module 5:  Advanced cyber risks and tools

    • Cyber crime and the darknet/darkweb: the world of the hackers/hacktivists
    • The underground of cyber criminality
    • Social engineering as a tool to test operational resilience
    • Open Source Intelligence (OSINT)
    • Cyber threat intelligence
    • Open source and commercial security tools
    • The operational use of encryption
    • Virtual private networks

Course Methodology

The course will include practical sessions, videos as well as live examples [e.g. Virus] and demonstrations of white and black hat hacking tools. All participants will also be provided with the latest research papers and articles.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities.

Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.

Course Objectives

By the end of the course, participants will be able to:

Target Audience

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure.

This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.

Target Audience Competencies

  • Information security management
  • Vulnerability assessment and management
  • Applying cyber security solutions
  • Developing IT policies and procedures
  • Cyber forensics
  • Ethical hacking and Black Hat hacking

A FEW OF OUR HAPPY CLIENTS...

GET YOUR EARLY BIRD DISCOUNT NOW!

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities.

Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.