Cyber Threats and Vulnerabilities Foundation

This foundation training covers the variety of different vulnerabilities and exploits that all organisations face within their enterprise combining risk and mitigation strategies to support you back in the workplace.

Difficulty
Rating
5days
Duration
2560,00 
+ VAT
Dates:
Location:
Register before
Spoken language: English

We are sorry, but the course is already full, please try with another date or location.

Agenda

Overview

Security operations training to help you respond to security threats and vulnerabilities. This course provides insight into the topics of vulnerabilities and threats, focused on ‘Technical, Human & Physical’. This foundation training covers the variety of different vulnerabilities and exploits that all organisations face within their enterprise combining risk and mitigation strategies to support you back in the workplace.

The course is designed for individuals responsible for defending organisations from cyber attacks.

Objectives

  • Cyber Threats
  • Types of Vulnerabilities
  • Human Vulnerabilities
  • Common Vulnerabilities & Weaknesses
  • Technical Exploits
  • Evasion
  • Risk Management & Mitigation
  • Industry Research

Outline

Module 1 – Cyber Threats

  • Vulnerabilities Definition
  • Exploits Definition
  • Malware Definition
  • Attacking Confidentiality, Integrity and Availability
  • Threats in Context

Module 2 – Types of Vulnerabilities

  • Physical
  • Process
  • Software
  • Hardware
  • People
  • CVE’s
  • Exploits
  • Covering Tracks
  • Common Examples

Module 3 – Human Vulnerabilities

  • People
  • Social Engineering
  • Common Weaknesses

Module 4 – Common Vulnerabilities & Weaknesses

  • CVE Database
  • CWE Database

Module 5 – Technical Exploits

  • Software based
  • Physical exploits
  • Exploiting applications

Module 6 – Evasion

  • Covering tracks
  • Backdoors
  • Hiding Data

Module 7 – Risk Management & Mitigation

  • Implementing Controls
  • Patching
  • Architectural Designs
  • Technical

Module 8 – Industry Research

  • Bug bounties
  • Responsible disclosure

Prerequisites

There are no specific prerequisites for this course, however, participants are expected to have a general understanding of cyber threats and risk management

Agenda

Places left:
No participant limit
-
2560,00  + VAT