Full catalogue of courses
The course dives deep into CSIRT/SOC establishment practice, where combination of theory, unique experience with lessons learned, and hands-on practice give attendees a clear and actionable picture on how to build an effective cybersecurity team.
This training helps to successively prepare for cybersecurity team establishment and answers the main questions raised before starting:
At the completion of this training course, participants will be able to: - Understand both the importance and the processes necessary to handle data so as to insure its admissibility in a court of law. - Develop an investigative process for the digital forensic investigation. - Understand methods of focusing investigations through analysis of multiple evidence sources. - Effectively prepare for incident response of both victim and suspect systems, including understanding the importance of network reconnaissance and network traffic analysis.
As cyber threats grow in number and sophistication, building a security team dedicated to incident response is a necessity. In many organizations, a computer security incident response team (CSIRT) has become essential to deal with the growing number and increasing sophistication of cyber threats. This particular course focused on how to build an effective cyber incident response team and its capability including the setup and the governance framework.
The course is designed to empower incident handlers to be effective at their work. The training course presents a comprehensive overview of cybersecurity teams' issues on a technical level, vulnerability handling, trend/technology watch, security tools, and also issues of artefact handling and forensics. The course is technical in nature, relying heavily on hands-on and practical experience. The most recent threats and vulnerabilities are treated.
Conocer y familiarizarse con los elementos involucrados en el Manejo y respuesta a incidentes de ciberseguridad
Ransomware is a major technique that is used by cyber attackers. Victims of Ransomware usually paid their money to attackers for decrypt their valuable files encrypted by Ransomware. This training will enable the participants to understand knowledge of types of Ransomware, encryption, and decryption mechanism of Ransomware. This course also provides hands-on practice with a virtual machine for encryption and decryption techniques used by Ransomware. By the end of this training, participants should be able to have: - Knowledge of Ransomware definition and objective.
El objetivo del curso es adquirir los conocimientos necesarios para entender el funcionamiento de un Sistema de Gestión de Seguridad de la Información (SGSI) y proponer un diseño de un proyecto de implementación.
Cyber is a buzz word that could be referred to as digital or computer in related to forensic. It is one of the most highly paid professional field in today's technology, is the practice of collecting, analyzing and reporting on computer-related crime with a goal of obtaining evidence that is legally admissible. From educational bodies to high level tech industry, spectrum of available computer forensic tools and skills were highly demanded.
Conocer y familiarizarse con los elementos involucrados en la Ingeniería y Gestión de la ciberseguridad