Cyber Threats and Vulnerabilities Foundation

This foundation training covers the variety of different vulnerabilities and exploits that all organisations face within their enterprise combining risk and mitigation strategies to support you back in the workplace.

Vaativuus
Arvostelut
5pvä
Kesto
2560,00 
+ alv./VAT
Ajankohta:
Sijainti:
Ilmoittaudu viimeistään
Puhuttu kieli: Englanti

Valitettavasti kyseinen kurssi on jo täynnä, kokeilethan toisella ajankohdalla tai sijainnilla.

Agenda

Overview

Security operations training to help you respond to security threats and vulnerabilities. This course provides insight into the topics of vulnerabilities and threats, focused on ’Technical, Human & Physical’. This foundation training covers the variety of different vulnerabilities and exploits that all organisations face within their enterprise combining risk and mitigation strategies to support you back in the workplace.

The course is designed for individuals responsible for defending organisations from cyber attacks.

Objectives

  • Cyber Threats
  • Types of Vulnerabilities
  • Human Vulnerabilities
  • Common Vulnerabilities & Weaknesses
  • Technical Exploits
  • Evasion
  • Risk Management & Mitigation
  • Industry Research

Outline

Module 1 – Cyber Threats

  • Vulnerabilities Definition
  • Exploits Definition
  • Malware Definition
  • Attacking Confidentiality, Integrity and Availability
  • Threats in Context

Module 2 – Types of Vulnerabilities

  • Physical
  • Process
  • Software
  • Hardware
  • People
  • CVE’s
  • Exploits
  • Covering Tracks
  • Common Examples

Module 3 – Human Vulnerabilities

  • People
  • Social Engineering
  • Common Weaknesses

Module 4 – Common Vulnerabilities & Weaknesses

  • CVE Database
  • CWE Database

Module 5 – Technical Exploits

  • Software based
  • Physical exploits
  • Exploiting applications

Module 6 – Evasion

  • Covering tracks
  • Backdoors
  • Hiding Data

Module 7 – Risk Management & Mitigation

  • Implementing Controls
  • Patching
  • Architectural Designs
  • Technical

Module 8 – Industry Research

  • Bug bounties
  • Responsible disclosure

Prerequisites

There are no specific prerequisites for this course, however, participants are expected to have a general understanding of cyber threats and risk management

Agenda

Paikkoja jäljellä:
Ei paikkarajoitusta
-
2560,00  + alv./VAT