Full catalogue of courses
As cyber threats grow in number and sophistication, building a security team dedicated to incident response is a necessity. In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. This particular course focused on how to build an effective cyber incident response team and its capability including the setup and the governance framework.
The course is designed to empower incident handlers to be effective at their work. The training course presents a comprehensive overview of cybersecurity teams' issues on a technical level, vulnerability handling, trend/technology watch, security tools, and also issues of artefact handling and forensics. The course is technical in nature, relying heavily on hands-on and practical experience. The most recent threats and vulnerabilities are treated.
Cyber is a buzz word that could be referred to as digital or computer in related to forensic. It is one of the most highly paid professional field in today's technology, is the practice of collecting, analyzing and reporting on computer-related crime with a goal of obtaining evidence that is legally admissible. From educational bodies to high level tech industry, spectrum of available computer forensic tools and skills were highly demanded.
Cet atelier permet aux participants de développer les compétences pour maitriser les éléments de base du management du risque lié à tous les actifs pertinents de la sécurité de l'information en utilisant la norme ISO/IEC 27005 comme cadre de référence. Grâce aux exercices pratiques et aux études de cas, le participant acquerra les connaissances et les compétences pour réaliser une appréciation optimale du risque de la sécurité de l'information et pour gérer les risques à temps en prenant connaissance de leur cycle de vie.
El objetivo del curso es adquirir los conocimientos necesarios para entender el funcionamiento de un Sistema de Gestión de Seguridad de la Información (SGSI) y proponer un diseño de un proyecto de implementación.
The candidates would be able to comprehend the cryptography and crypto currency concepts, develop understanding of participants on the importance of Blockchain technology, how to deploy the private blockchain on web and learn the prospects of blockchain.
The course is aimed at providing information on how to develop National Cyber Emergency Response Plans through a multi-stakeholder approach including all phases of disaster management.
Conocer y familiarizarse con los elementos involucrados en una investigación forense en informática. Explorar técnicas de colección, preservación, análisis y presentación de la evidencia digital.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000.
The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies.
Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
The course reviews relevant terms and background from the field of information security. This is followed by a broad overview of the collection and analysis of data; leading to the dentification of valuable data and how to secure data against common threats such as loss of privacy arising from data breaches theft or loss and the aggregation or integration of data. Practical sessions and discussion will cover pertinent issues of Data Governance such as data security controls, international legislative issues, digital data forensics as well as Privacy and ethical issues.