As cyber threats grow in number and sophistication, building a security team dedicated to incident response is a necessity. In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. This particular course focused on how to build an effective cyber incident response team and its capability including the setup and the governance framework.
Cyber is a buzz word that could be referred to as digital or computer in related to forensic. It is one of the most highly paid professional field in today's technology, is the practice of collecting, analyzing and reporting on computer-related crime with a goal of obtaining evidence that is legally admissible. From educational bodies to high level tech industry, spectrum of available computer forensic tools and skills were highly demanded.
Cet atelier permet aux participants de développer les compétences pour maitriser les éléments de base du management du risque lié à tous les actifs pertinents de la sécurité de l'information en utilisant la norme ISO/IEC 27005 comme cadre de référence. Grâce aux exercices pratiques et aux études de cas, le participant acquerra les connaissances et les compétences pour réaliser une appréciation optimale du risque de la sécurité de l'information et pour gérer les risques à temps en prenant connaissance de leur cycle de vie.
El objetivo del curso es adquirir los conocimientos necesarios para entender el funcionamiento de un Sistema de Gestión de Seguridad de la Información (SGSI) y proponer un diseño de un proyecto de implementación.
Conocer y familiarizarse con los elementos involucrados en una investigación forense en informática. Explorar técnicas de colección, preservación, análisis y presentación de la evidencia digital.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
The course reviews relevant terms and background from the field of information security. This is followed by a broad overview of the collection and analysis of data; leading to the dentification of valuable data and how to secure data against common threats such as loss of privacy arising from data breaches theft or loss and the aggregation or integration of data. Practical sessions and discussion will cover pertinent issues of Data Governance such as data security controls, international legislative issues, digital data forensics as well as Privacy and ethical issues.
The main objective of the course is to enable participants to develop simulation exercises that will help them build their capabilities and train them in handling cyber incidents. Other objectives include:
â¢ Develop crisis management capabilities and leadership with responsible actors;
â¢ improve the ability to interact with other actors in the crisis management system;
â¢ increase the ability to make quick decisions and communicate situation information;
â¢ develop the participants' ability and confidence in their own competence;
The training is planned to be face to face with the possibility of participating remotely but depending on the Coronavirus pandemic situation it could be run remotely only. The course dives deep into CSIRT/SOC establishment practice, where combination of theory, unique experience with lessons learned, and hands-on practice give attendees a clear and actionable picture on how to build an effective cybersecurity team. This training helps to successively prepare for cyber security team establishment.
This online course will provide theoretical and practical knowledge of IT and cyber security and security methods for computer, network and electronic communication.
The course consists of various chapters and will cover fundamentals, such as IT versus ICS, threats and their sources, authentication, computer access control, cryptography, network security, network firewall concepts, intrusion detection.
The student will get a comprehensive view on security in the cyber space.