Contact Us: +905397472269   -   +905373777978     Email: training@euro-training.net    Download Brochures
COURSE FINDER
LikeLike this course(1)PrintPrint E-mailSend to a friend
BOOKING INQUIRY PDF

Conferences


Cyber Security


REF: C8313  DATES: 28 Oct - 1 Nov 2019  VENUE: Amsterdam (Netherlands)  FEE: 4500 

Overview:

Participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.  All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations and cyber security team management.

Cybersecurity is critical to business and involves the protection of IT systems and data from cyber threats such as computer-assisted fraud, espionage, sabotage or vandalism.
Benefits of managing cybersecurity?

CONFERENCE OBJECTIVES:

  • Formulate and manage effective cyber security teams, and apply the Computer Security Incident Response Team (CSIRT) framework, tools and capabilities to deliver cost effective and robust solutions to protect the organization.
  • Examine the area of wireless security protocols, their security attributes, and their potential insecurities within the organization, and in public spaces.
  • Illustrate how penetration testing and ethical hacking enhance organizational security.
  • Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence.

Target Audience:

  • IT professionals
  • Security professionals
  • Auditors, site administrators
  • General management and anyone tasked with managing and Protecting the integrity of the network infrastructure.
  • This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.

Target Competencies:

  • Information security management.
  • Vulnerability assessment and management.
  • Applying cyber security solutions.
  • Developing IT policies and procedures.
  • Cyber forensics.
  • Ethical hacking and Black Hat hacking.

CONFERENCE OUTLINE:

What is Cybersecurity?

Cybersecurity is critical to business and involves the protection of IT systems and data from cyber threats such as computer-assisted fraud, espionage, sabotage or vandalism.

Benefits of managing cybersecurity?

  • Protect networks and data from unauthorized access.
  • Improved information security and business continuity management.
  • Improved stakeholder confidence in your information security arrangements.
  • Improved company credentials with the correct security controls in place.
  • Faster recovery times in the event of a breach.

Adopting cyber security measures:

  • Employee perception on security through Neuro Linguistic Programing (NLP).
  • Security education and awareness: techniques, systems, and methodologies.
  • Penetration testing.
  • Ethical hacking.
  • Options to mitigate viruses, malware, active code threats and Active Persistent Threats (APT).
  • The Computer Incident Response Team (CSIRT) frameworks, tools and capabilities.
  • Incident first response: proven methodologies, tools, and systems.
  • The science of applying robust digital forensics: applicable law, capabilities, and methodologies.
  • Supervisory Controls and Data Acquisition (SCADA); security requirements, processes and methodologies.
  • Abuse images: complying with local and international law.

Building cyber security teams:

  • Creation and management of a Secure Operations Center (SOC).
  • Development of the Corporate Security Organization Framework.
  • Formulation and deployment of a Computer Security Incident Response Team (CSIRT).
  • Bespoke Security Incident and Event System (SIEM) for the operational deployment.
  • Risks associated with I/O Security (e.g. USBs, CDs, other forms of media).
  • Risks of Active Code Injection, and mitigation techniques.

Advanced cyber risks and tools:

  • Cyber crime and the darknet/darkweb: the world of the hackers/hacktivists.
  • The underground of cyber criminality.
  • Social engineering as a tool to test operational resilience.
  • Open Source Intelligence (OSINT).
  • Cyber threat intelligence.
  • Open source and commercial security tools.
  • The operational use of encryption.
  • Virtual private networks.
COURSE DATES
28 Oct - 1 Nov 2019
COURSE REF
C8313
VENUE
Amsterdam (Netherlands)
COURSE FEE
4500 

COURSE REF: C8313

Cyber Security

Amsterdam (Netherlands)


COURSE DATES: 28 Oct - 1 Nov 2019
COURSE FEE: 4500 

BOOKING INQUIRY
 

Contact Us


Istanbul, Turkey
Phone: +905397472269

Dubai, UAE
Phone: +971544558902
Lebanon
Phone: +96181746278

Email: training@euro-training.net
Copyright Euro Training © 2011