Emerging Security Threats And Countermeasures

About The Course

People are the key information assets of an organization. Unfortunately, they are often not properly trained to detect and identify threats noticing them on time. This becomes easy for an adversary to easily siphon out organization’s intellectual property such as blueprints, business plans, policy details, source codes, patents, copyrights causing irreplaceable competitive advantage and reputation in industry. The only proven and time-tested deterrent to such nefarious activities is a well groomed security mindset that people need to imbibe through regular training in security.

In this two-day workshop, candidates are introduced to real-life incidents which have caused multi-million dollar losses to companies due to lax security controls and implementation. Frequently, they happen due to lack of proper security awareness among the people of the organization. We see how people become the security’s “weakest” link.

Next, we delve deeper into the discovery and reconnaissance techniques which are popularly used by attackers to know about the weak points of entry in the organization’s network. Specific attack techniques such as privilege escalation, password cracking, denial-of-service attacks and so on are put forward to demonstrate how weak security practices and implementation go a long way to compromise the security of the systems where the information assets reside.

Security exploits framework, Threat modeling are now put forward to demonstrate how an attacker is able to penetrate and compromise the security of the organization’s network. Finally, we look into defensive strategies to contain the impact of threat agent to the most prized information asset(s) in the organization. Last but not the least, if in case any breach does take place, the incident management procedures are put forward for proper asset recovery and salvaging.

Who should attend?

This course is focused on all security enthusiasts, team leads, IT managers, decision makers, senior managers to understand the latest threats to information security and the preventive measures for the same.

Table of Contents

Session 1: Introduction & Case Studies
Session 2: Ground Level Realities
Session 3: Knowing the target
  • Reconnaissance Principle
  • Fingerprinting & Footprinting
  • GHDB
  • Social Engineering
  • Network Mapping
Session 4: Server Side Attack
Session 5: Exploitation Framework
Session 6: Threat Modeling
Session 7: Defensive Measures – Best Practices
Session 8: Incident Management

Previous TrainingLaw Enforcement & Senior Management
Next TrainingIT Risk Management
Bhushan Jeevan Rane, Assistant Manager – SHCIL

Faculty has a good trainers. Yes, the course met its objective.

Mukesh Lokre, Information Security Analyst – Travelex

Faculty has delivered the content clearly. He has a good subject knowledge.

Chinmay Dhawale, Information Security Analyst – Travelex

Very impressive, knowledgeable, technically sound & skilled trainers.

Shital Ranadive, Info Security Analyst – IDBI Intech Ltdt

Faculty is good & has explained the topics very well.

Register for a training