Why Attend
This course will provide participants with in-depth knowledge and practical skills to plan, deliver and protect, and monitor Digital assets, and Cyber security postures of internal and external systems, applications, and deployments. Encompassing a complete, conjoined set of disciplines in the areas of Cyber Security, including Policies, Play-books, Security/Penetration Testing, Ethical Hacking and Black Hat Hacking.
The 2022 updated course now also includes an extensive set of features which encompass the SOC (Security Operations Centre), CSIRT (Computer Security Incident Team), and Dark Art OSINT (Open Source Intelligence) elements. Included here are over 30 tools, books, articles, and support mediums to help the delegates gain in-depth expertise in this specialized discipline.
We will also cover Wi-Fi security and engineering in depth, Malware defenses, Ransom ware attacks, Website security, human factors, Cyber Forensics and Investigations, cyber security team management
As part of the course, participants engage multiple hands-on sessions, and conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets. All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations.
The 2022 course now also includes a real-time hands-on module which will footprint a digital deployment to discover and exposures, vulnerabilities, data leaks or technical misconfigurations – here again introducing 4 new tools to the course.
The course will include practical sessions, videos as well as live examples [e.g., Virus] and demonstrations of white and black hat hacking tools. All participants will also be provided with the latest research papers and articles.
By the end of the course, participants will be able to:
IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.