Cyber Security Threats, Assessment & Management

Date Jul 6, 2020
Time 0900 GMT+7
Cost 1499.00
Online
An exciting and informative course, delivered by a world renowned expert. This course presents a counter-point to the more formal and rigid ISO approach to cyber security. The course is not about firewalls and industry standards - it is about how attackers effectively target and hack organisations without being stopped by expensive technical defences, and without financial backing. The key to almost every effective cyber-attack is exploiting the human workforce. As such, the course concentrates on information security and the power of visible data, rather than the traditional focus on IT security.
 
The course simultaneously provides candidates with the investigative capabilities to probe the data vulnerabilities in their own staff, corporations and networks - though no technical knowledge is assumed. It is delivered by a former UK intelligence officer who specialises in tracking targets and organisations with open source tools.

Course Objectives​
  • Scene setters - case studies of small and large attacks
  • Attacking the human firewall - why human phishing beats any defensive tech
  • Phishing - anatomy of an attack. Recent examples to analyse
  • Search engines - advanced use in obtaining sensitive corporate data, with practical (lab)
  • Social media - advanced use in obtaining hidden personal data, with practical (lab)
  • Metadata extraction. Getting hold of corporate documents and deriving exploitable info.
  • Covert activity - concealing your online digital footprint from adversaries, with practical (lab)
  • Wi-fi exploitation. Understanding the tracking threat, with practical (lab)
  • Penetration testing - anatomy of a security audit. In-house and outsourcing.
  • Discussions (throughout) - approaches in defending an organisation

Who should attend?
  • CISO
  • Security Director
  • Cyber Security Manager / Officer
  • Security Analyst / Engineer
  • SOC Analyst
  • Cyber Threat Analyst
  • CERT Member
  • System / IT Administrator
  • Security Administrator
  • Security Architect / Engineer
  • Compliance Officer / Auditor
  • Developer
  • Auditor

 


comments powered by Disqus
Create your own event
Turn your passion into a business.
Join our mailing list