Cyber Threats, both internal and external, have the potential to impact confidentiality, integrity and availability if controls are not in place.
New laws and regulations or growth in data may pose a threat to the organization. Human threats can include everything from carelessness to espionage. And, of course, there are an array of technical threats, including, but in no way limited to, malicious code, unauthorized access, malware, or hardware/software failures
The amount or significance of threat can vary, dependent upon whether the enterprise is working in cloud, mobile, Internet of Things (IoT), big data or security analytics. As information shifts location (moving from mobile, to IoT, to cloud, for example), there will be a need for new classes of controls to address the new locations of information, and those new classes of controls will require updating as well as auditing
This workshop on Cyber Security & Audit recognizes the dangers, vulnerabilities the organisation faces, and the effect and probability of such attacks.
Types of cybercrime (credit card frauds, payment frauds, net banking frauds, etc.)
Recent internet banking frauds and their modus operandi
Cybercrime cases (past, present, and future expectations)
How to use proxy servers
How to detect proxy servers
Mobile hacking & security (Live demos of mobile hacking and how to secure your mobile)
Call recording & spoofing
Hacking the entire mobile, etc.
Vulnerability scanning in websites
SQL Injection
Cross-Site Scripting (XSS)
DOS (Denial of Service)
Defacing a website
Uploading a shell on the web server
Investigating emails
Analyzing email headers
Windows file analysis tools
MAC forensics
Linux forensics
Understanding Wireshark
Windows server forensics
Data acquisition software tools
Creating images of pen drives/HDD
Investigating websites & web applications
Mobile forensics
Complete laptop/desktop forensic (e.g., when an employee leaves the company and activity on their system needs to be traced)
Filing cyber complaints
Software Provided:
Kali Linux, Nmap, NetScan Tools Pro, Nessus, SAINT, GFI LANguard, TOR, OmniPeek Network Analyzer, Sandcat, Wikto, Acunetix, Havij, TrueCrypt, and many more.
Please click the button below to download the course content. You'll need to provide your contact information to receive the document.