Security Awareness Training

Learn Security Awareness Best Practices

In this one-day session, candidates will be exposed to various case-studies which put forward the impact of implementation of lax security practices and controls over the information assets; and the damage it can cause to the organization. We look into emerging threat platforms which act as the new avenues for attackers to gather organization’s sensitive data.

We also look into how to construct perimeter defenses and configuration hardening to provide baseline security for the organization. We also explore the necessity of having a good security governance structure comprising of good security practices for warding off potential threats to have any impact on the organization. Lastly, we look into the need for proper incident management practices whenever a breach happens and is detected in the organization.

Duration

1 Day

Course Contents

  • Introduction & Case Studies
  • Business Risks from Security Vulnerabilities
  • Security Testing Methodologies
  • Types of Attacks
  • How RSA got hacked
  • How Stuxnet infected Iran’s nuclear plants
  • The biggest cyber-crime in history
  • Mobile Security
  • Cloud Security
  • SCADA Security
  • Telecom Security
  • How do you guard from the guards?
  • Application Security
  • Operating System Security
  • Database Security
  • Network Security
  • Why ISO 27001 isn’t enough
  • People and Social Engineering
  • Hacked – Now What?
  • Digital Forensics
  • Module 23: Why Cloud Computing Will Be Popular with Business Units
  • Module 24: Building your Cloud Computing Strategy
  • Module 25: Final Thoughts

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content