The course dives deep into CSIRT/SOC establishment practice, where combination of theory, unique experience with lessons learned, and hands-on practice give attendees a clear and actionable picture on how to build an effective cybersecurity team.
This training helps to successively prepare for cybersecurity team establishment and answers the main questions raised before starting:
As cyber threats grow in number and sophistication, building a security team dedicated to incident response is a necessity. In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. This particular course focused on how to build an effective cyber incident response team and its capability including the setup and the governance framework.
The course is designed to empower incident handlers to be effective at their work. The training course presents a comprehensive overview of cybersecurity teams' issues on a technical level, vulnerability handling, trend/technology watch, security tools, and also issues of artefact handling and forensics. The course is technical in nature, relying heavily on hands-on and practical experience. The most recent threats and vulnerabilities are treated.
Cyber is a buzz word that could be referred to as digital or computer in related to forensic. It is one of the most highly paid professional field in today's technology, is the practice of collecting, analyzing and reporting on computer-related crime with a goal of obtaining evidence that is legally admissible. From educational bodies to high level tech industry, spectrum of available computer forensic tools and skills were highly demanded.
Cet atelier permet aux participants de développer les compétences pour maitriser les éléments de base du management du risque lié à tous les actifs pertinents de la sécurité de l'information en utilisant la norme ISO/IEC 27005 comme cadre de référence. Grâce aux exercices pratiques et aux études de cas, le participant acquerra les connaissances et les compétences pour réaliser une appréciation optimale du risque de la sécurité de l'information et pour gérer les risques à temps en prenant connaissance de leur cycle de vie.
This course aims to provide a student with an understanding of risk management processes according to ISO 27000 and ISO 31000. The content will cover such topics as risk assessment and risk management as a core process for an ISMS, risk handling, and mitigation strategies. Besides that, a general introduction to emergency operation planning, crisis management, and cyber-insurance subjects will be provided.
El objetivo del curso es adquirir los conocimientos necesarios para entender el funcionamiento de un Sistema de Gestión de Seguridad de la Información (SGSI) y proponer un diseño de un proyecto de implementación.
By the end of the course, participants should be able to: - To understand cybersecurity key elements (C.I.A). - To understand the dangerous actors that pose cyber threats in cyberspace. - To understanding the concept of threat, vulnerability, and risks related to cybersecurity. - To gain a hands-on experience skill how to defence for cyber-attacks
The course is aimed at providing information on how to develop National Cyber Emergency Response Plans through a multi-stakeholder approach including all phases of disaster management.
By invitation only! Cybersecurity is a complex challenge that encompasses multiple different governance, policy, operational, technical and legal aspects. This training provides general knowledge to address, organise and prioritise many of these areas based on existing and well-recognised models, frameworks and other references. The training focuses on elements for protecting civilian aspects of cyberspace and as such, it covers the overarching principles and good practice that need to be considered in the process of drafting, developing and managing a National Cybersecurity Strategy.