The main objective of this training course is to allow participants to acquire sufficient knowledge on how to empower an incident reponse team for effective incident resolution and mitigate the impact of security threats within their organizations. Other objectives include:
This course presents a detailed methodological approach to understanding trends in cybercrimes and how cybercrimes can be investigated. It is a comprehensive course covering major forensic investigation scenarios that enable students to acquire hands-on experience on various cybercrime investigation techniques and standard tools necessary to successfully carry-out a mobile forensic investigation. This course will also teach participants how to gather electronic artifacts from mobile devices.
Ransomware is major techniques that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware.
By the end of this training, participants should be able to have:
For the efforts towards strengthening cyber security to be successful, technical teams must be specifically trained on practicalities of incident response. The training course presents a comprehensive overview of cybersecurity teams' issues on a technical level, vulnerability handling, trend/technology watch, security tools, and also issues of artefact handling and forensics. The course is technical in nature, relying heavily on hands-on and practical experience. The most recent threats and vulnerabilities are treated.
La transformation digitale des systèmes d'information et des usages est un enjeu de développement crucial pour les organisations et les entreprises.
To learn basic programming concepts using Python 3
By the end of this training, participants should be able to:
â¢ Understand the importance of creating self-made tools.
â¢ Understand the basics of programming.
â¢ Ability to create small Python scripts/programs.
â¢ Develop skills in testing and debugging of programs.
Analizar el proceso de gestión de incidencias en escenarios de fallas de seguridad y profundizar en el proceso de automatización para determinar las acciones de cada caso.
Due to successive technological advancements, developments, and innovations, the global industrial landscape has drastically transformed over the last years. The fourth industrial revolution (Industry 4.0) aims at transforming previous generation's industries into intelligent ones by incorporating IoT as innovative technology. Internet of Things (IoT) is a rapidly growing concept that has dramatically contributed to the industry 4.0 realization.
The protection of information is a critical function for all enterprises. Cybersecurity is a growing and rapidly changing field that focuses on the protection of information assets that are embedded in internetworked information systems. Given today's technological advances, professionals who are involved in information technologies must be knowledgeable about the central concepts and security implications that frame and define this increasingly all-pervasive field.
After completing this course, attendees will be able to:
Comprender el funcionamiento de los protocolos de red bajo un enfoque de seguridad. Explorar sistemas de detección y análisis de incidentes que se puedan suscitar en una red de datos.