For the efforts towards strengthening cyber security to be successful, technical teams must be specifically trained on practicalities of incident response. The course is designed to empower incident handlers to be effective at their work.
This course will provide students with unique expertise in the area of critical infrastructure cyber security. The course will cover typical threats and vulnerabilities typical to it and industrial control systems.
Another part of the course will be dedicated to a case study on incident response in a hypothetical environment. This will be continued by the practical part, where students will play the role of hackers, who a targeting industrial control and security systems of the improvised company with the break-out session on consequences and potential mitigation strategies.
El objetivo principal de este curso es dar una introducción al proceso de investigación de evidencias digitales a fin de esclarecer los puntos básicos para el reconocimiento de información en medios digitales y presentación de evidencias.
As our world becomes more connected data security and privacy becomes critical. This course aims to equip the participant with the knowledge on data security, cyber hygiene and protection of the personal data . Participants will also learn the advantages and challenges of complying with available international data privacy laws and regulations like standards of ISO 27001 and EUâs GDPR.
Continuous growth and reliance on Information Communication and Technologies (ICT) results not only in benefits to organizations, but also in cyber incidents, which threatens ICT infrastructure and sensitive data inside it. The ability to timely detect, mitigate and recover from cyber incidents is a crucial capability to organizations, established and managed within Computer Security Incident Response Teams (CSIRTs/CERTs/CIRTs) and Security Operation Centers (SOCs), thereafter - cybersecurity team.
The main objective of the course is to learn the necessary skills to perform regular risk assessments in organisations. Other objectives include: â¢ How to perform a risk assessment â¢ How to map an organizationâs business requirements to implemented security controls. â¢ To learn the elements of risk assessment and the data necessary for performing an effective risk assessment. â¢ To identify risk management models for implementing risk management program in organisations.
The Domain Name System (DNS) is a critical part of Internet infrastructure and the largest distributed Internet directory service. DNS translates names to IP addresses, a required process for web navigation, email delivery, and other Internet functions. However, the DNS infrastructure is not secure enough unless the security mechanisms such as Transaction Signatures (TSIG) and DNS Security Extensions (DNSSEC) are implemented.
Vulnerabilities that exists from connecting to the network increases as more people and devices become connected and smarter. This program aims to equip participants with the necessary knowledge and skills to counter the threats from cybersecurity and protect critical infrastructures.
Cet atelier a pour objectif de présenter les normes, les concepts de base et les bonnes pratiques liées à la sécurité des services électroniques bancaires. Il permettra aux participants de maîtriser les risques liés aux services électroniques dâInternet et de Mobile Banking et dâidentifier les solutions techniques adéquates pour remédier à ces risques tel que la certification électronique des échanges et des divers acteurs, les techniques de chiffrement, les mécanismes de signatures et d'horodatage électronique des actes faits en ligne.
Cet atelier met l'accent sur :
This online course will provide an introduction into ISO 27000 standard information security series as well as advanced theoretical knowledge and practical examples of development, integration as well as operation of isms according to ISO 27001 international standard. Students will learn about information security-related processes like risk management, areas of standard application and necessary controls along with annex a to ISO 27001, which is compliance-related.