panel_start Introduction panel_end
Cyber Threats, both internal and external, have the potential to impact confidentiality, integrity and availability if controls are not in place.
New laws and regulations or growth in data may pose a threat to the organization. Human threats can include everything from carelessness to espionage. And, of course, there are an array of technical threats, including, but in no way limited to, malicious code, unauthorized access, malware, or hardware/software failures
The amount or significance of threat can vary, dependent upon whether the enterprise is working in cloud, mobile, Internet of Things (IoT), big data or security analytics. As information shifts location (moving from mobile, to IoT, to cloud, for example), there will be a need for new classes of controls to address the new locations of information, and those new classes of controls will require updating as well as auditing
This workshop on Cyber Security & Audit recognizes the dangers, vulnerabilities the organisation faces, and the effect and probability of such attacks.
panel_start Target Audience panel_end
panel_start Course Content panel_end
I.T SECURITY
Understanding IP & MAC addresses Proxy Servers
OWASP Top 10 : Website Hacking & Security
Understanding Data leakage solutions for Data security.
Understanding the ISO 27001 standards
CYBER CRIME INVESTIGATIONS & DIGITAL FORENSICS
Network Forensics :
( incase an employee leaves the company to trace the activity done on his computer)
Software provided : Kali Linux, Nmap, NetScan Tools Pro, Nessus, SAINT, GFI LANGuard, TOR, OmniPeek Network Analyzer, Sandcat, Wikto, Acunetix, Havij, TrueCrypt & lot more
Please click the button below to download the course content. You'll need to provide your contact information to receive the document.
Please fill out the form below to request more information about this course.
Error: Contact form not found.