
Lokální instruktorem vedené Cyber Security školení České republice.
Reference
Hackování
Mohalmald Salim - PSO
Kurz: Ethical Hacker
Machine Translated
Maciej kontaktní osoba, s mnoha znalostmi a zkušenostmi, kromě materiálů také prezentovány zajímavé příklady převzaté z jeho vlastní praxe.
PSI Polska Sp. z o.o.
Kurz: Bezpieczeństwo aplikacji internetowych
Machine Translated
Hackování
Mohalmald Salim - PSO
Kurz: Ethical Hacker
Machine Translated
Maciej kontaktní osoba, s mnoha znalostmi a zkušenostmi, kromě materiálů také prezentovány zajímavé příklady převzaté z jeho vlastní praxe.
PSI Polska Sp. z o.o.
Kurz: Bezpieczeństwo aplikacji internetowych
Machine Translated
Cyber Security Návrh Školení
In this instructor-led, live training (remote), participants will learn the fundamentals of HIPAA as they step through a series of hands-on live-lab exercises.
By the end of this training, participants will be able to:
- Understand the basics of HIPAA
- Develop health applications that are compliant with HIPAA
- Use developer tools for HIPAA compliance
Audience
- Developers
- Product Managers
- Data Privacy Officers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice.
Note
- To request a customized training for this course, please contact us to arrange.
Toto školení vedené instruktorem, na místě nebo na dálku, je zaměřeno na analytiky informačního systému, kteří chtějí používat MITER ATT & CK ke snížení rizika ohrožení bezpečnosti.
Na konci tohoto školení budou účastníci schopni:
- Nastavte nezbytné vývojové prostředí pro zahájení implementace MITER ATT & CK.
- Klasifikujte interakci útočníků se systémy.
- Dokumentujte protichůdné chování v systémech.
- Sledujte útoky, dešifrovací vzorce a hodnotící nástroje obrany již na místě.
Formát kurzu
- Interaktivní přednáška a diskuse.
- Spousta cvičení a cvičení.
- Praktická implementace v prostředí živé laboratoře.
Možnosti přizpůsobení kurzu
- Chcete-li požádat o přizpůsobené školení pro tento kurz, kontaktujte nás a domluvte se.
All staff who need a working knowledge of Compliance and the Management of Risk
Format of the course
A combination of:
- Facilitated Discussions
- Slide Presentations
- Case Studies
- Examples
Course Objectives
By the end of this course, delegates will be able to:
- Understand the major facets of Compliance and the national and international efforts being made to manage the risk related to it
- Define the ways in which a company and its staff might set up a Compliance Risk Management Framework
- Detail the roles of Compliance Officer and Money Laundering Reporting Officer and how they should be integrated into a business
- Understand some other “hot spots” in Financial Crime – especially as they relate to International Business, Offshore Centres and High-Net-Worth Clients
This instructor-led, live training (online or onsite) is aimed at computer users who wish to understand malware and take appropriate measures to minimize its threat.
By the end of this training, participants will be able to:
- Understand the concept of malware.
- Identify the different types of malware.
- Take necessary steps to mitigate malware (procedural, technological, awareness, etc).
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training, participants will understand Internet of Things (IoT) architectures and learn the different IoT security solutions applicable to their organization.
By the end of this training, participants will be able to:
- Understand IoT architectures.
- Understand emerging IoT security threats and solutions.
- Implement technologies for IoT security in their organization.
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange
This instructor-led, live training (online or onsite) is aimed at engineers who wish to learn the methods and tools needed to protect their organization's information systems against attack.
By the end of this training, participants will be able to:
- Understand information security at both the computer level and communications level.
- Prevent physical and digital access to private information systems.
- Prevent the modification of information that is in storage, being processed, or being transmitted.
- Protect against denial of service attacks.
- Take the necessary measures to detect, document, and counter security threats.
- Ensure that organizational information is kept confidential.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
This course is the non-certifcation version of the "[CISA - Certified Information Systems Auditor](/cc/cisa)" course. CISA® is the world-renowned and most popular certification for professionals working in the field of IS audit and IT risk consulting.
Objectives:
- Use the knowledge gained to benefit your organisation
- Provide audit services in accordance with IT audit standards
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, I.T. professionals, Internal & External auditors, Information security, and risk consulting professionals.
This is an Instructor led course, and is the non-certification version of the "[CISMP - Certificate in Information Security Management Principles](/cc/cismp)" course
Description:;
The course will provide you with the knowledge and understanding of the main principals required to be an effective member of an information security team with security responsibilities as part of your day to day role. It will also prepare individuals who are thinking of moving into information security or related functions.
Objectives:
To provide students with the skills and knowledge required to demonstrate the following:
- Knowledge of the concepts relating to information security management (confidentiality, availability, vulnerability, threats, risks and countermeasures etc.)
- Understanding of current legislation and regulations which impact upon information security management in the UK; Awareness of current national and international standards, frameworks and organisations which facilitate the management of information security;
- Understanding of the current business and technical environments in which information security management has to operate;
- Knowledge of the categorisation, operation and effectiveness of controls of different types and characteristics.
In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.
By the end of this training, participants will be able to:
- Simulate attacks against applications and validate their detection and protection capabilities
- Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios
- Quickly and accurately fix the application code responsible for detected vulnerabilities
- Prioritize the vulnerability findings from dynamic scans
- Use RASP real-time alerts to protect applications in production against attacks.
- Reduce application vulnerability risks while maintaining production schedule targets
- Devise an integrated strategy for overall vulnerability detection and protection
Audience
- DevOps engineers
- Security engineers
- Developers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.
Overview:
- GRC Basic terms and definitions
- Principles of GRC
- Core components, practices and activities
- Relationship of GRC to other disciplines
In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.
By the end of this training, participants will be able to:
- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system
Audience
- Network engineers
- Developers
- System engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
The purpose of the Ethical Hacking Training is to:
- Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
- Inform the public that credentialed individuals meet or exceed the minimum standards.
- Reinforce ethical hacking as a unique and self-regulating profession.
Audience:
The Course is ideal for those working in positions such as, but not limited to:
- Security Engineers
- Security Consultants
- Security Managers
- IT Director/Managers
- Security Auditors
- IT Systems Administrators
- IT Network Administrators
- Network Architects
- Developers
By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software.
Format of the course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Target Audience:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
organization or who, for other reasons, wish to achieve and demonstrate a broad
understanding of the law, including the EU General Data Protection Regulation (GDPR) and
the UK Data Protection Bill and their practical application. It is recognized that those with
overall responsibility for data protection within an organization will need to develop a detailed
understanding of the law"
This course is designed for a wide range of people such as law enforcers, crime investigators, managers in larger organizations, technical personnel in larger organizations, and anyone else interested in a general background of digital forensics.
This instructor-led, live training (online or onsite) is aimed at engineers in telecommunication companies who wish to set up an end-to-end digital identity management system.
By the end of this training, participants will be able to:
- Understand, evaluate and adopt different approaches to managing usernames and passwords.
- Setup a single login system that works across all applications used in a telecom environment.
- Use identity technology to get a clear understanding of their customers and their needs.
- Implement an authentication system that works across different platforms (laptop, mobile, etc.).
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
You will learn how to perform a forensic investigation on both Unix/Linux and Windows systems with different file systems. with many advanced topics like wireless, network, web, DB and Mobile crimes investigation
In this instructor-led, live course, participants will learn how to formulate the proper security strategy to face the DevOps security challenge.
Format of the course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Most of today's IoT connections are industrial. Industrial IoT (IIoT) connections require Low Power Wide Area (LPWA) technologies to provide connectivity, coverage and subscription capabilities for low bandwidth applications. Although these requirements could be served by existing cellular networks, such networks may not be ideal. NB-IoT (Narrow Band IoT) technology offers a promising solution.
In this instructor-led, live training, participants will learn about the various aspects of NB-IoT (also known as LTE Cat NB1) as they develop and deploy a sample NB-IoT based application.
By the end of this training, participants will be able to:
- Identify the different components of NB-IoT and how to fit together to form an ecosystem.
- Understand and explain the security features built into NB-IoT devices.
- Develop a simple application to track NB-IoT devices.
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Target Audience would be - Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals
This instructor-led, live training (online or onsite) is aimed at security engineers and system administrators who wish to integrate more security into their Ubuntu Linux distribution and protect their system from threats.
By the end of this training, participants will be able to:
- Install and configure Ubuntu operating system.
- Reinforce the physical security of Ubuntu Linux distribution.
- Embed encrypted server features to protect the administration system.
- Secure device interactions within the Ubuntu System.
- Recognize general security threats to Ubuntu environment and execute the proper solutions.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.