Cybersecurity Courses

Courses

Cybersecurity Introduction/Skill Ramp-Up

The duration of some courses is given as a minimum to maximum number of days. The actual duration can be adjusted to accomodate desired depth of coverage, specific topics addressed, and the technological and organisational complexity of a customer environment to be considered.

  • What is Cybersecurity?
  • Cyberrisks and Mitigation Strategies
  • Strategy, Technology, Governance
  • Enabling a Cyberaware Organisation
  • What is Cybersecurity for Management?
  • Cyberrisk Categories and Management Controls
  • Strategy, Technology, Governance
  • Motivating a Cybervigilant Organisation
  • Effective Knowledge Management Instruments
  • Essential skills for a Cybervigilant Organisation
  • Collaborative Learning for Threat Intelligence
  • Facilitating a Best Practice Exchange in an Organisation
  • Cybersecurity Drills and Assessments

Cybersecurity Advanced Topics

The duration of some courses is given as a minimum to maximum number of days. The actual duration can be adjusted to accomodate desired depth of coverage, specific topics addressed, and the technological and organisational complexity of a customer environment to be considered.

  • Continuation of 101 – Practical Workshop
  • 200 Cyberrisks and Practical Mitigation Strategies
  • Strategy, Technology, Governance Applied
  • Setting up a Cyberaware Organisation
  • Continuation of 102 – Practical Workshop
  • Cyberrisk Categories and Management Controls
  • Strategy, Technology, Governance
  • Motivating a Cybervigilant Organisation
  • Collaborative Learning for Threat Intelligence
  • Incentives and Motivation for Cybersecurity
  • 200 Risks – Structuring the domain of Cybersecurity Challenges
  • Knowledge Management Platforms for Cybersecurity
  • Why encrypt information?
  • Different types of encryption
  • Effectively managing encryption in an organization
  • Encryption tools integrating into work environments
  • Hands-on workshop
  • What is network security?
  • Perimeter protection
  • Protecting resources inside your network
  • Under attack! Examples of hacking
  • A secure network architecture
  • IoT security issues
  • Threat Intelligence
  • What is application security?
  • Best practices for application development
  • Testing for Cybersecurity aspects
  • Information classification - know what is valuable
  • Multi-tier architectures: their complexity and their benefits
  • Protecting data repositories
  • How to measure Cybersecurity risk
  • Cybersecurity risk controls
  • Workshop: define and evaluate controls
  • Information classification - know what is valuable
  • Adequate reporting guidelines

Cybersecurity Reviews and Audits

The duration of some courses is given as a minimum to maximum number of days. The actual duration can be adjusted to accomodate desired depth of coverage, specific topics addressed, and the technological and organisational complexity of a customer environment to be considered.

  • Identification of key business requirements and objectives for resilience
  • Definition of key business risks (usually taking results from course 302)
  • Assessment of security requirement fulfilment levels
  • Rating
  • Recommendations
  • Identification of key business requirements and objectives for risk management
  • Lessons from materialized risks of the past
  • Assessment of impact and likelihood of individual risks
  • Rating
  • Recommendations
  • Quick overall assessment of relevant aspects
    • Information classification for applications
    • Security architecture of multi-tier applications
    • Cybersecurity aspects in application development
    • Cybersecurity aspects in application testing
    • Information classification for infrastructure zones
    • Security architecture of multi-tenant IT infrastructure
    • Cybersecurity aspects in infrastructure operations
    • Maturity of the IT infrastructure and operations procedures
    • Maturity of change management
  • Recommendations