prospen.co.za

ProspenAfrica | Training and Consulting Services Provider

Comprehensive Cybersecurity Masterclass

Safeguarding the Digital Realm

5 Day Training

Dates: 09 – 13 September 2024
Locations: Johannesburg, South Africa
Platform: Available In-Class

Price: Available on request

Course Introduction

Embark on a Journey of Mastery in Cybersecurity

Join our immersive Cybersecurity Masterclass, a transformative learning experience designed to equip you with the skills and knowledge needed to navigate the ever-evolving landscape of digital security. In this in-depth program, you will delve into the intricacies of cybersecurity, from threat detection and prevention to incident response and risk management.

 

Whether you represent a business, government institution, academia, or non-profit entry, we understand your digital requirements. This 5 Day training will help you understand and manage cybersecurity risks and develop matching response frameworks and plans. As part of the program, we will help you determine direct and indirect threats, security exposures, and potential vulnerabilities that might affect your organisation and prepare you for incident response.

Course Objectives

  • Understand a range of security threats and think strategically about vulnerability management

  • Employ leading international standards and governance models for cybersecurity

  • Determine specific threats presented by malware, viruses, active code, and APT and selected appropriate mitigating tools and mechanisms.

  • Build and manage high-performing cyber-security teams

  • Comprehend CSIRT framework, tools, and capabilities and deliver functional solutions for protecting the organisation

  • Determine potential insecurities within the organisation by examining security protocols and attributes.

  • Determine a comprehensive understanding of how penetration testing and ethical hacking can enhance organisational security.

Who should attend?

  • IT Professionals

  • Risk Assessors

  • Security Professionals

  • System engineers

  • Auditors and Site Administrators

  • Anyone involved in IT, cyber, and digital; Security

IT and Records Courses

Training Methodology

Our diverse instructional approaches ensure effective learning:

– Lectures & Presentations: Engage with expert-driven, stimulating content.
– Course Material: Access well-crafted supporting resources.
– Group Work: Collaborate on discussions and case studies for practical insights.
– Workshops & Role-Play: Participate in immersive, scenario-based activities.
– Practical Application: Focus on applying theoretical knowledge in real situations.
– Post-Training Support: Receive extensive support after training for skill implementation.

Training Outline

Module One

  • Introduction to Cyber-security and Organised Crime

  • Key components for Cyber Crime and Targeted Attacks

  • Information Security standards

  • ISO/IEC 27001

  • Control Objectives for Information and Related Technology

  • ISO/IEC 2018

  • Privacy Regulations

  • Government Stipulation and Access to private Date

Module Two

  • Enterprise security: External Defences, Web filtering, IPS, IDS and Firewall

  • Secure Code and Software Development Lifecyle

  • Potential insecurities in developed applications

  • WIFI security protocol and attributes

  • VoIP security protocols and attributes

  • VoIP Security

  • NLP and Employee Security Perception

  • Security Education and Awareness

  • Penetration testing

Module Three

  • Ethical Hacking and Black hat hacking

  • Mitigating viruses, malware, active code threats, and APT

  • CSIRT Framework and Tools

  • Incident First Response

  • Digital Forensics

  • SCADA

  • Abuse Images

  • Secure Operation Centre

  • Corporate Security Organisation Framework

  • Deploying Computer Security Incident Response Team

Module 4

  • Security Incident and Event System

  • I/O Security

  • Risk of Active Code Injection

  • Cyber Crime and Darknet

  • Open-source Intelligence

  • Cyber Threat Intelligence

  • Security Tools

  • Encryption and Virtual Private Network

  • The 1-10-60 Rule

  • Alternate Data Streams(ADS) and NTFS Environment

Module Five

  • Knowledge Share: How to harness the potential of Cybersecurity tools and solutions and tackle challenges

  • Case Studies

Related Courses

Advanced Electronic Document and Records Management
Dates: 22 - 26 Jul | 09 - 13 Sep | 11 - 15 Nov 2024

Advanced Electronic Document and Records Management

View More
Azure Big Data Analytics Training
Dates: Available on Request

Azure Big Data Analytics Training

View More
Basic Registry, Records, And Archives Management Course
Dates: 15 - 19 Jul | 16 - 20 Sep | 02 - 06 Dec 2024

Basic Registry, Records, And Archives Management Course

View More
Big Data Analytics with Python Training
Dates: Available on Request

Big Data Analytics with Python Training

View More

Open chat
Need Help? Chat with Us
Scan the code
Powered by Prospen Africa
Welcome to Prospen Africa!
Check out our 15% Off sale when you purchase QCTO Training Material