By the end of the course, participants will be able to:
Apply information security standards to their organization and its critical assets
Identify the threats presented by viruses, malware, active code, and Active Persistent Threats (APT) and consider the different mitigating options
Formulate and manage effective cyber security teams, and apply the Computer Security Incident Response Team (CSIRT) framework, tools and capabilities to deliver cost effective and robust solutions to protect the organization
Use Neuro Linguistic Programing (NLP) to deliver messages that will change the way employees work and think about security
Examine the area of wireless security protocols, their security attributes, and their potential insecurities within the organization, and in public spaces
Illustrate how penetration testing and ethical hacking enhance organizational security
Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence
Target Audience
IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.