Cyber Threats, both internal and external, have the potential to impact confidentiality, integrity and availability if controls are not in place.

New laws and regulations or growth in data may pose a threat to the organization. Human threats can include everything from carelessness to espionage. And, of course, there are an array of technical threats, including, but in no way limited to, malicious code, unauthorized access, malware, or hardware/software failures

The amount or significance of threat can vary, dependent upon whether the enterprise is working in cloud, mobile, Internet of Things (IoT), big data or security analytics. As information shifts location (moving from mobile, to IoT, to cloud, for example), there will be a need for new classes of controls to address the new locations of information, and those new classes of controls will require updating as well as auditing

This workshop on Cyber Security & Audit recognizes the dangers, vulnerabilities the organisation faces, and the effect and probability of such attacks.

Target Audience

  • Network experts hoping to enhance their insight and explore cyber security as a career path.
  • Executives and managers wanting to build their capacity to communicate with security experts and implement effective security strategies at an organizational level.
  • Individuals seeking to improve their understanding of cybersecurity fundamentals, including risks, mitigation controls, and organizational responsibilities.

Course Content

I.T Security

  • Types of cybercrime (credit card frauds, payment frauds, net banking frauds, etc.)

  • Recent internet banking frauds and their modus operandi

  • Cybercrime cases (past, present, and future expectations)

Understanding IP & MAC Addresses & Proxy Servers

  • How to use proxy servers

  • How to detect proxy servers

  • Mobile hacking & security (Live demos of mobile hacking and how to secure your mobile)

  • Call recording & spoofing

  • Hacking the entire mobile, etc.

OWASP Top 10: Website Hacking & Security

  • Vulnerability scanning in websites

  • SQL Injection

  • Cross-Site Scripting (XSS)

  • DOS (Denial of Service)

  • Defacing a website

  • Uploading a shell on the web server

Understanding Data Leakage Solutions for Data Security

Understanding the ISO 27001 Standards


Cyber Crime Investigations & Digital Forensics

  • Investigating emails

  • Analyzing email headers

  • Windows file analysis tools

  • MAC forensics

  • Linux forensics

Network Forensics

  • Understanding Wireshark

  • Windows server forensics

  • Data acquisition software tools

  • Creating images of pen drives/HDD

  • Investigating websites & web applications

  • Mobile forensics

  • Complete laptop/desktop forensic (e.g., when an employee leaves the company and activity on their system needs to be traced)

  • Filing cyber complaints


Software Provided:
Kali Linux, Nmap, NetScan Tools Pro, Nessus, SAINT, GFI LANguard, TOR, OmniPeek Network Analyzer, Sandcat, Wikto, Acunetix, Havij, TrueCrypt, and many more.

COURSE SCHEDULE & FEES

AUG
01
FRI
2:00 Pm to 5:00 Pm
Training Session
Online
In-Person Training
6253
Inclusive of all taxes

DOWNLOAD COURSE CONTENTS

Please click the button below to download the course content. You'll need to provide your contact information to receive the document.

×

Download Course Content

Please fill out the form below to download the course content PDF.

INCOMPANY/GROUP TRAINING REQUEST

Why Choose Our Incompany Program?

  • 🎯 Tailored content specific to your business goals
  • 👥 Train entire teams together, saving time and cost
  • 📍 Delivered at your location or virtually
  • 📅 Flexible scheduling to suit your timelines
  • 📈 Increase retention and application of skills


    Current topic: [decoded_course_title]

    Any customisation Required