Cyber Crime Protect Training
Select Other "city & date"
Cyber Crime Protect Training Course
Introduction:
In just five days, enroll in the accelerated Cyber Crime Protect course to gain a comprehensive understanding of information security management concepts.
This course equips you with the skills to collaborate effectively with IT and security professionals in order to mitigate risks throughout IT infrastructure. Alongside enhancing your knowledge of IT technology, this cyber awareness training delves into the following areas:
1. Components of IT infrastructure.
2. Risk management.
3. Threats to information systems and corresponding protective measures.
4. Controls utilized to safeguard IT systems.
During this accelerated cyber awareness course, you will engage in both individual and group exercises that simulate real-life scenarios. These exercises will require you to implement preventive measures for securing IT systems, providing you with hands-on experience.
Course Objectives:
- You'll be trained in just 5 days. You'll learn fast when you're taught by law enforcement professionals
- You’ll learn more. Get immersed in the world of cybercrime as you learn from instructors with experience in cybercrime operations and policing
- You’ll learn faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
Course Outlines:
Scripting
Automating operating system and network activities for the extraction and analysis of data from computing devices.
Information security management
Risk and threat and how these concepts inform policy in the modern enterprise regarding the protection of information stored in computing infrastructures.
Computer systems security
The security and resilience of computer systems, their vulnerability level and the exploitation opportunity they present to perpetrators.
Incident response and forensic readiness
Responding to incidents originating from the cyber-domain while adhering to digital forensic principles regarding data attributes.
Enumeration of network devices
Mapping out the logical incident scene, identifying internal and external network boundaries.
Linux security architecture
Kernel security modules and how they support ISM principles.
Windows security architecture
Windows security modules and how they support ISM principles.
Security audit
Systematic evaluation of the security of an enterprise environment by measuring how well it conforms to a set of established criteria.
Performance and practice
Perform a security audit of an information infrastructure.
Example Terms, Techniques and Technologies
CIA, Bell-LaPadula, risk and threat
Information security models for access controls as part of a defense in depth strategy. Risk and threat management of informational infra structures.
Foot printing, port scanning and enumeration of computer systems
Identifying and assessing vulnerability levels of computing devices.
Incident response and readiness, network monitoring, infrastructure auditing
Establish capability in the business environment for securely gathering legally admissible evidence, establish policy for secure storage and handling of potential evidence, ensure monitoring and auditing is targeted to detect and deter major incidents.
Advanced network security
Understanding Firewalls, IDS, IPS, Netflow, Wireshark data captures.
