Training Course On Advanced Cyber Security, Systems Audit And ICT Counter Intelligence Solutions

training at skillsforafrica.co.ke training at skillsforafrica.co.ke
Tue Apr 30 16:11:16 UTC 2024


<http://tracking.skillsforafrica.co.ke/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KOM1ryqTLNw8L_LIO264gli5jUqSdAeiOYbsj3qhijEqPFVLLFP3P-U5FtzJi2N-2tNgYExdoZtciUvtj1mNqe38VfEivX_QnviQc6YngmezY01>
Training Course On Advanced Cyber Security, Systems Audit 
And ICT Counter Intelligence Solutions

Dates
Fees
Location
Apply
13/05/2024 - 24/05/2024
$5500
Dubai

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLM86LTSCKH_oSWXYUn4sGD6jKOx0QmUAJ8Bt0N7bhMZNKCJYAJ7Ueb_0_vsN_NX0P8d-TN4R4juz25gTj3S8v6_MqDBek4Y3B7_Mus0LsdmOJ0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6l9CFQn2N49tHR7euaLydi3XJm80b28_NdYF9VjBIaeIDBv2_aIGDSWGb5-zf-yCgSPJE1B1t9nCnQVEHId-hd7OaLQR3Y3-nngjSoS0G5kb70>
Online 
    Class
10/06/2024 - 21/06/2024
$3000
Nairobi

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CL4mnra1KFCYFmGsxRFdTmPJxw9iCQyUkmjphKDBtguXHHJTIDUnhkc75FW_1PPY25NynXbz36QysJ24dd9ScRXlsMCOUZCo4ElpqWwK2WhHvb0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6i0MlHYSlVLoIT2yQ77dNl6hvaZg-R8oLSGjJ8QN8A3Kk0_8hMcB8OTHteNwMWlbxkjsNsOTkOazlMFiLzuLAyUoLkqJKyJcjZYghyhU75shy0>
Online 
    Class
08/07/2024 - 19/07/2024
$3000
Nairobi

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLwRIp_g6daePaHWFvHx-G7Zc-sbESabkOJoC4xvqfZgVTQn4_AuZN6MC0y8n7KfH5R4Nt86lb_i5qIGMn4rCZpSM8bf55yXMiJpulcRp-k9QM0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6NGtWhPRz3pJkWw2QCvG9sgEHU11FlMqz88OZiHCtzAyIeVitKVVp5jjIqeHW8B4HOehUCZJJcxCPcpZF8fmPOvLg2H1N0AAmbDZoXWLubfe30>
Online 
    Class
12/08/2024 - 23/08/2024
$3000
Nairobi

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLRIZ6yGSEXuJcwzK8RAimO2VN1S69Bh2KTkfVZAUsMtY8jf0qukYF7snztfGZvpbxjCHCl0YKeHG5ip96z8iRIpitIKi7rHsZTq_0W4-ZuCnB0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6xhE1lVA1SmWEO6UiMPY0E6p4x1Tog8ZHxo-0x8ssgC_t01Cg2be9B86D9u7avNoUyp_0MBxqnPpSWx9THTbvxSbrgArKt7J22QCGmPg7I9d20>
Online 
    Class
09/09/2024 - 20/09/2024
$3000
Nairobi

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLhsCVUaU8pwGsvqGPj10gN5FF0982F-P4oznv9PgnDVR9gB8rMrGEyMEhWRUedLBGFZjuofKwaQRCiJzm4aLH4XcT5PXtnZE42DpJQvR-F8wB0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6VYq7dx75xMXtexQRCk2kl102u-LOuVcxLPsYjW1FxRlpOWSaU00DlKLSCw0qIbsFqDWPcTx1CJjnvh1iigG-nbKoP6HF62ZcUnFFVXFH06jc0>
Online 
    Class
14/10/2024 - 25/10/2024
$3950
Kigali

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLJZ-5PNZCTsVz2PW2PHZ1bQLTSuToTmEOUnsFqrgNhuMjkVnVxyfKe4Q9sJyr2NHjliOx1EvMEmRG30z0YuxC4gsJPx1mTzszWUkSewh2CT8L0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6fqP3Y9c-bPgKF468Nogya8ml8G-7hJNYCUMXt75FEnjvEhNvyIkG1oCalJEzKj7OS_DeztiF_MZfnNa13f_DzOPlYbfRrfi3ZWzxC4VycDGo0>
Online 
    Class
11/11/2024 - 22/11/2024
$3000
Mombasa

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLYjCK4K8Q9Uht687xqLFSZmn918Ws-s4W_M5TS4sYNRyETZcPX8mmDaNXnYtaaWTGTytnNbRVHhsRbdMhVqEtdRfBebrWjbcXSSFdqlU8KFxW0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6x31rBn_7o7eZ5zga8tPaG_beX1OQcuN9DBaoI_dnVEu29QujvEWbZs9yCfdJ5xBx4URL4p5JoNTev1_Rx-PFqk-ek82dW0r01Lq9uz1C4QNC0>
Online 
    Class
09/12/2024 - 20/12/2024
$3000
Nairobi

<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLmbZ-BHWErH5Z_kuMjfTy4fGINAi62hUU3rLY-f8HbZmwIf6ki-a6b9uHt65_BAeonLAmgN86E0vkiuidvvsSUp2Q-trMDgc-3mK6rIEeTxho0>
Physical Class


<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6SBba7NkaFADXAdcN_XuGBstJ-0UR43U9wRKmovdBT_m9Lx3cmjnzcDkkwcPnbB6aFxmaWJWiurEpKaAosM2fv0EUYNNa45us6w7RxobwOHaP0>
Online 
    Class
 

<http://tracking.skillsforafrica.co.ke/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KMSa90TlGCKKJ5hIH4i_iwQ5f7pT6EDj0xmTw0vZNMuwG5OO-fhWSu8SF4lx7iuqcNpyuHT1-RpA8l8p6Ay7aXc83P_kJRs_fgnH3eZ8ZuhNnU1>
Calendar for 2024 
Workshops
 

<http://tracking.skillsforafrica.co.ke/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KNeMtBVqwr0Ob8EtQE8EtVEUtNGdJcJWjZHJwXWXak5hTtSfhcRDcIYm-jimKvYj22D3-LTH5pU9UvRqeqFlg6lyl3XfwAac5GK5ppgLDrRLaE1>
Contact us
 

<http://tracking.skillsforafrica.co.ke/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejgUscRk74HwXZ5MAiUpbCVgxiAixOFUlOejV7wbktYYvXxjHMEp1Xq7rzgrPJKyzpoDxFR8lCiCslHsoWy9pX1sr6zJYopYY5n3CSj8nM5bhrQ1>
Whatapp
 
Office 
Telephone: +254-702-249-449
Register 
as a group of 5 for the price of 4 on the course fee. 
Send 
us an email: 
<http://tracking.skillsforafrica.co.ke/tracking/click?d=ra_Krquym_vAH7a0xfyiRRRJ0mmMognyg56kmPeJDcOATg5hRkN4jmHMwEzF0zgtO48KNNuLGUdwlG1qKjUnbUM2IeT0IcOWbfJllT42JsXf6Y19QhWC8oKCg0wGVhMM8dMJxiCpXSV51OPtubIGYY2TbC5uFzFAusdLKekoL0VdkjIhHCszN5V_7j8FX-DyUHgSZnGOqJ2ppXohStC8bNHj7ABOot5b1OOkdzOqPihB0>
training at skillsforafrica.org or 
call +254-702-249-449
 
INTRODUCTION
Information 
and know-how are valuable company assets, and in times of fierce competition, 
organizations need to protect their information and systems against the threat 
of corporate espionage. Many organizations are unaware of potential information 
leaks, and as a result counterintelligence operations are neglected or are 
simply a series of routine technical measures. However, employees typically 
represent a major weak spot for organizations – which means that existing 
processes and structures for information flows need to be challenged. Empirical 
research indicates that most information losses are traced back to a company’s 
employees, or the personnel of its suppliers, customers, or partners – all of 
whom have access to confidential information. The training will look at the 
different threats organizations might face and ways in which they can protect 
and secure it against attacks. Participants will also learn how to set up 
counterintelligence processes that involve collecting information and conducting 
counterintelligence activities.
 
Course 
Objectives
By 
the end of this course, participants should be able to:
Know 
  the purpose of a cybersecurity audit
Define 
  cybersecurity audit controls
Identify 
  cybersecurity audit frameworks
Explain 
  proper audit team performance
Define 
  the benefits of a cybersecurity audit
Learn 
  how to identify vulnerable points within your organization and how to secure 
  them.
Run 
  awareness campaigns among your colleagues in order to raise awareness of 
  espionage threats and protect them from attacks.
Develop 
  in-depth knowledge of the various forms of contemporary espionage 
  threats.
Master 
  how to identify, monitor, and evaluate information 
  risks.
Become 
  familiar with ethical and legal counterintelligence activities and 
  techniques.
Seize 
  the opportunity to share experience and knowledge with competitive/market 
  intelligence experts and peers from a range of 
  industries.
 
     
Duration
    
10 Days
    
Who should Attend
Individuals 
  involved in cybersecurity management
Learning 
  and development professionals
Internal 
  auditors
IT 
  professionals and managers working with information systems, who need to 
  understand best practices and standards to ensure security and integrity of 
  these systems
Individuals 
  seeking to gain knowledge about the main processes of auditing a cybersecurity 
  program
Individuals 
  interested to pursue a career in cybersecurity audit
Competitive/Market 
  Intelligence Analysts and Managers
Knowledge 
  and Information Managers
Specialists 
  from R&D, Technology and Risk Management
 
      
COURSE CONTENT
What 
  is a Cybersecurity Audit?
Introduction
What 
  is a Cybersecurity Audit?
When 
  to Perform a Cybersecurity Audit
Controls 
  and Frameworks
Cybersecurity 
  Audit Controls
Cybersecurity 
  Audit Frameworks
Completing 
  the Audit
The 
  Audit
Audit 
  Completion
Understanding 
  Cyber Threat Intelligence
Defining 
  Threats
Understanding 
  Risk
Cyber 
  Threat Intelligence and Its Role
Expectation 
  of Organizations and Analysts
Diamond 
  Model and Activity Groups
Four 
  Types of Threat Detection
Process 
  of auditing information systems
Governance 
  and management of IT
Information 
  systems’ acquisition, development and implementation
Protection 
  of information assets
Information 
  systems’ operation, maintenance and service management
Threat 
  Intelligence Consumption
Sliding 
  Scale of Cybersecurity
Consuming 
  Intelligence for Different Goals
Enabling 
  Other Teams with Intelligence
Positioning 
  the Team to Generate Intelligence
Building 
  an Intelligence Team
Positioning 
  the Team in the Organization
Prerequisites 
  for Intelligence Generation
Planning 
  and Direction (Developing Requirements)
Intelligence 
  Requirements
Priority 
  Intelligence Requirements
Beginning 
  the Intelligence Lifecycle
Threat 
  Modeling
Recent 
  cybercrime trends
Cyberwar 
  attacks leading to the shutdown of production facilities or utilities (e.g. 
  Stuxnet, Emotet).
Ransomware 
  trojans and smart viruses.
Recent 
  espionage threats and protection
Risk 
  audits: Identification, monitoring, and evaluation of risks for information 
  theft.
Electronic 
  eavesdropping — reality or fiction?
Audio-visual 
  information gathering.
Product 
  piracy.
Information 
  drainage through social engineering
Threats: 
  Elicitation, back-door recruitment, external personnel, Romeo approaches, 
  social media activities (sockpuppets), and pretext 
  calls.
Protection: 
  Vulnerability analysis, employee training, and never-talk-to-strangers 
  policies.
Security 
  of data and communication networks
Protection 
  against hacking and orchestrated attacks.
The 
  weak spot — exploiting the human factor.
Opportunities 
  and limitations for technical counterintelligence 
  solutions.
Secure 
  communication: Safe data transfer methods, minimization of communication 
  risks, and protection of corporate communication 
  structures.
Internet: 
  How to securely conduct research, transfer data, and avoid harmful 
  software.
Illustration 
  of attacks with numerous small case studies.
Counterintelligence: 
  The role of CI/MI professionals in espionage 
protection.
Prevention 
  campaigns.
Penetration 
  tests for an outside-in perspective.
Briefing/de-briefing 
  of colleagues with sensitive external contacts.
 
Training 
Approach
This 
course is delivered by our seasoned trainers who have vast experience as expert 
professionals in the respective fields of practice. The course is taught through 
a mix of practical activities, theory, group works and case 
studies.
Training 
manuals and additional reference materials are provided to the 
participants.
Certification
Upon 
successful completion of this course, participants will be issued with a 
certificate.
 THE END


 
<http://tracking.skillsforafrica.co.ke/tracking/unsubscribe?d=KxypFTpHc1_SkJKdiUORSA1TzwGQP1b0Idlp7yFNCT9cF7wXVlne9zPrtmpaNxowzStQ4UUAf0Vzt0nLuzpe-uilGNvSr6s0NAMgNKIE1t-K4jSphr9YEueQxd2mSY0l9w2>
UNSUBSCRIBE
<http://tracking.skillsforafrica.co.ke/tracking/botclick?msgid=OAMd_VqrbVLG5xg6q1OKMg2&c=1493392764631762477>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.reproducible-builds.org/pipermail/rb-commits/attachments/20240430/cc463cc1/attachment.htm>


More information about the rb-commits mailing list