Cyber Security Training
The programme has been specifically designed to provide you with a highly practical guide to the key skills; strategies and techniques that you will need in the handling of IT security issues.
Description
This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book,
security/penetration testing, ethical hacking and black hat hacking. It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT)
infrastructures As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities.
Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets. All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations.
Course Objectives
By attending this ICL training course, delegates will learn about:
-
Cyber Security Risk Defined
-
How to Manage Cyber Risk
-
Building a Cyber Security Strategy
-
Implementing a Cyber Security Strategy
-
Aligning with Regulatory Requirements
-
Managing Change Related to Cyber Security
-
Cyber People – The Right People and Structure
-
Cyber Metrics – Measuring Your Cyber Risk
-
Cyber Intelligence
-
It’s happened – Your hacked – What to Do!
-
Cyber and the Boardroom – How to Interact
How will this Training Course be Presented?
Live-Online
Who is this Training Course for?
-
IT Professionals
-
Security Professionals
-
Senior managers who are responsible for managing risk and/or embedding effective systems of corporate governance.
-
ICT Managers/Officers
-
Chief executives and heads of departments who require a better understanding of cyber risk management and the role it should play within their organizations.
-
Risk Professionals
-
Insurance managers,
-
Brokers,
-
Safety practitioners,
-
Auditors,
-
Project managers,
-
Accountants,
-
Solicitors and
-
Consultants who are increasingly finding cyber risk management is forming part of their remit or are expected to have an understanding of the subject.
The Course Content
Topics
-
Introduction to Risk Assessment and Management
-
Ensuring compliance with applicable regulatory drivers
-
Protecting the organization from unacceptable losses
-
Describing the Risk Management Framework
-
Applying risk management processes
-
Practical exercise
Characterizing System Security Requirements
-
Defining the system
-
Outlining the system security boundary
-
Pinpointing system interconnections
Practical exercise
-
Incorporating the unique characteristics of Industrial Control Systems (ICS) and cloud-based systems
Identifying security risk components
-
Practical exercise
-
Estimating the impact of compromises to confidentiality, integrity and availability
-
Adopting the appropriate model for categorizing system risk
-
Setting the stage for successful risk management
-
Documenting critical risk assessment and management decisions in the System Security Plan (SSP)
-
Appointing qualified individuals to risk governance roles
Selecting Appropriate Security Controls
-
Assigning a security control baseline
-
Investigating security control families
-
Determining the baseline from system security risk
-
Tailoring the baseline to fit the system
-
Examining the structure of security controls, enhancements and parameters
-
Binding control overlays to the selected baseline
-
Gauging the need for enhanced assurance
-
Distinguishing system-specific, compensating and non-applicable controls
Reducing Risk Through Effective Control Implementation
-
Specifying the implementation approach
-
Maximizing security effectiveness by "building in" security
-
Reducing residual risk in legacy systems via "bolt-on" security elements
-
Applying NIST/ISO controls
-
-
Enhancing system robustness through selection of evaluated and validated components
-
Coordinating implementation approaches to administrative, operational and technical controls
-
Providing evidence of compliance through supporting artifacts
-
Assessing Compliance Scope and Depth
Developing an assessment plan
-
Prioritizing depth of control assessment
-
Optimizing validation through sequencing and consolidation
-
Verifying compliance through tests, interviews and examinations
-
Formulating an authorization recommendation
-
-
Evaluating overall system security risk
-
Mitigating residual risks
-
Practical exercise
-
-
Publishing the Plan of Action and Milestones (POA&M), the risk assessment and recommendation
Authorizing System Operation
-
Aligning authority and responsibility
-
Quantifying organizational risk tolerance
-
Elevating authorization decisions in high-risk scenarios
-
Forming a risk-based decision
-
Appraising system operational impact
-
Weighing residual risk against operational utility
-
Issuing Authority to Operate (ATO)
Maintaining Continued Compliance
-
Justifying continuous reauthorization
-
Measuring impact of changes on system security posture
-
Executing effective configuration management
-
Performing periodic control reassessment
-
Preserving an acceptable security posture
-
Delivering initial and routine follow-up security awareness training
-
Collecting on-going security metrics
-
Practical exercise
-
-
Implementing vulnerability management, incident response and business continuity processes