Are you an IT, Security or Engineering professional?
Register for a Cyber Security Professional Development workshop organized by Abaster Consulting Inc.
New and emerging threats are being introduced, or discovered on daily basis at the rate we have never seen in the past. The advancement in technology and improvement in innovation has compounded the problems on cybersecurity professionals, who must continually deal with the influx of digital threats. As a Technology or Security professional, your skills must remain relevant in the face of ongoing hack and cyber-attacks. Abaster Consulting team has put together a comprehensive development package to learn about solutions, techniques (process and technical), and strategies to mitigate some of the worst security challenges of our time.
The Cyber Security Workshop is a short duration program targeted towards the cybersecurity enthusiasts and delivered by our security experts. Candidates will gain knowledge and hands-on practical experience in a fully equipped training room that provides professional development training in the professional areas listed below.
Attendees: Professionals already practising in some form of Security or IT domain, but wishes to develop their skills to remain competitive, efficient and skillful in emerging areas. To attend the event, complete and submit a Registration Form and one of our representatives will follow up with you on next steps.
- Impacts of hacking to an Enterprise
- Identifying hackers’ techniques
- Traces: Foot printing and reconnaissance
- Traces: Foot printing and reconnaissance and Scanning networks
- Identifying and reviewing Enumeration Techniques
- System Hacking
- Analyzing viruses, worms and sniffers
- Social Engineering and Denial-of-Service (DoS)
- Reviewing, Assessing, and Preventing Gaps in a Network Infrastructure
- Ethical Hacking Project (EHP)
- Emerging Economic Models for Software Vulnerability Research
- Cyber Fraud: Principles, Trends, and Mitigation Techniques
- Enterprise Cyber Threat Landscape
- Enterprise Cyber Threat Landscape
- The Rise and Fall of a Criminal ISP
- IFrame Attacks – An Examination of the Business of IFrame Exploitation
- Distributed Denial of Service (DDoS) Attacks: Motivations and Methods
- The Torpig Trojan Exposed
- Cyber Fraud Audit Exercise
- IS Audit Process
- IS Audit Function Knowledge
- Audit Function
- IS Risk and Fundamental Auditing Concepts
- Standards and Guidelines for IS Auditing
- Audit Evidence Process
- Principles of Big data analytics
- Big data analytics algorithms
- Using BIG Data in Enterprise
- Big Data Technologies
- Data processing using MapReduce
- Cloud Computing and Security Concept
- Infrastructure Security in the Cloud
- Addressing the Security challenges in the Cloud
- Governance and Control for Cloud Computing
- Understand Compliance and Legal requirements
- Understanding risk, audit and assessment for the
- Cloud
- IS Risk and Fundamental Auditing Concepts
- Identity and Access Management
- Securing Data in the Cloud
- Intrusion detection and Response
- Conceptual design of network security
- Introducing security concepts
- Security Processes: OCTAVE, Security Risk, Identification and Analysis Threat Modelling
- Performing due diligence architecting your security
- Components of an Enterprise Security Architecture
- Challenges facing Security Architecture.
- Design and setup enterprise security architecture
- Enterprise Security policy
- Data Classification
- Components of security domains
- System Interconnectivity
- Access Management
- Public key infrastructure
- Data loss prevention strategy
- Hardware security configuration concept
- Security Configuration Management
- Identification and Authentication
- Media Protection
- Security Planning and Procedures
- Finding the right methodology for Cybersecurity project
- Steps to deploying Cybersecurity project
- Formulate plan for cybersecurity project
- Design and Deployment Cybersecurity project in a Matrix Organization
- Creating a roadmap for Cybersecurity Project Management
- Evaluating the cost of cybersecurity program
- Performance Metrics: Cybersecurity Program
- Performing Threat and Vulnerability Assessments
- Measuring KPI using Risk-Based Approach
- Developing workable strategy for cyber security program
- Enterprise Risk Management: An Introduction and Overview
- ERM and its Role in Strategic Planning and Strategy Execution
- ERM Tools and Techniques
- Identify and Classify risks
- Enterprise Risk Management: Case studies and Industry research analysis
- ERM concepts, framework and processes
- Strategic and operational risks
- Financial and insurance risk
- Internal and external stakeholder management
- Crisis management and business continuity
- Enterprise risk: mitigation and assessment
- ERM: laws and policies
- ERM: Governance
- Financial Impact of Cyber attacks
- Risk Assessment
- Introduction to Identity and Access Management
- Information Architecture
- Information Classification
- Create identity for Organizations, Personnel and Technology
- Develop Access policy for device and enterprise users.
- Access Risk Management
- Understand phases of Personable Identifiable Information (PII) Lifecycle
- Information Security Management
- Cybersecurity and Identity and Access Management
- Information Ethics and Privacy
- Access Control
- Implementing Identity and Access Management for Organizations
- Personnel Security
- Contingency Planning