Training Course On Advanced Cyber Security, Systems Audit And ICT Counter Intelligence Solutions
training at skillsforafrica.co.ke
training at skillsforafrica.co.ke
Tue Apr 30 16:11:16 UTC 2024
<http://tracking.skillsforafrica.co.ke/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KOM1ryqTLNw8L_LIO264gli5jUqSdAeiOYbsj3qhijEqPFVLLFP3P-U5FtzJi2N-2tNgYExdoZtciUvtj1mNqe38VfEivX_QnviQc6YngmezY01>
Training Course On Advanced Cyber Security, Systems Audit
And ICT Counter Intelligence Solutions
Dates
Fees
Location
Apply
13/05/2024 - 24/05/2024
$5500
Dubai
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLM86LTSCKH_oSWXYUn4sGD6jKOx0QmUAJ8Bt0N7bhMZNKCJYAJ7Ueb_0_vsN_NX0P8d-TN4R4juz25gTj3S8v6_MqDBek4Y3B7_Mus0LsdmOJ0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6l9CFQn2N49tHR7euaLydi3XJm80b28_NdYF9VjBIaeIDBv2_aIGDSWGb5-zf-yCgSPJE1B1t9nCnQVEHId-hd7OaLQR3Y3-nngjSoS0G5kb70>
Online
Class
10/06/2024 - 21/06/2024
$3000
Nairobi
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CL4mnra1KFCYFmGsxRFdTmPJxw9iCQyUkmjphKDBtguXHHJTIDUnhkc75FW_1PPY25NynXbz36QysJ24dd9ScRXlsMCOUZCo4ElpqWwK2WhHvb0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6i0MlHYSlVLoIT2yQ77dNl6hvaZg-R8oLSGjJ8QN8A3Kk0_8hMcB8OTHteNwMWlbxkjsNsOTkOazlMFiLzuLAyUoLkqJKyJcjZYghyhU75shy0>
Online
Class
08/07/2024 - 19/07/2024
$3000
Nairobi
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLwRIp_g6daePaHWFvHx-G7Zc-sbESabkOJoC4xvqfZgVTQn4_AuZN6MC0y8n7KfH5R4Nt86lb_i5qIGMn4rCZpSM8bf55yXMiJpulcRp-k9QM0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6NGtWhPRz3pJkWw2QCvG9sgEHU11FlMqz88OZiHCtzAyIeVitKVVp5jjIqeHW8B4HOehUCZJJcxCPcpZF8fmPOvLg2H1N0AAmbDZoXWLubfe30>
Online
Class
12/08/2024 - 23/08/2024
$3000
Nairobi
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLRIZ6yGSEXuJcwzK8RAimO2VN1S69Bh2KTkfVZAUsMtY8jf0qukYF7snztfGZvpbxjCHCl0YKeHG5ip96z8iRIpitIKi7rHsZTq_0W4-ZuCnB0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6xhE1lVA1SmWEO6UiMPY0E6p4x1Tog8ZHxo-0x8ssgC_t01Cg2be9B86D9u7avNoUyp_0MBxqnPpSWx9THTbvxSbrgArKt7J22QCGmPg7I9d20>
Online
Class
09/09/2024 - 20/09/2024
$3000
Nairobi
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLhsCVUaU8pwGsvqGPj10gN5FF0982F-P4oznv9PgnDVR9gB8rMrGEyMEhWRUedLBGFZjuofKwaQRCiJzm4aLH4XcT5PXtnZE42DpJQvR-F8wB0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6VYq7dx75xMXtexQRCk2kl102u-LOuVcxLPsYjW1FxRlpOWSaU00DlKLSCw0qIbsFqDWPcTx1CJjnvh1iigG-nbKoP6HF62ZcUnFFVXFH06jc0>
Online
Class
14/10/2024 - 25/10/2024
$3950
Kigali
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLJZ-5PNZCTsVz2PW2PHZ1bQLTSuToTmEOUnsFqrgNhuMjkVnVxyfKe4Q9sJyr2NHjliOx1EvMEmRG30z0YuxC4gsJPx1mTzszWUkSewh2CT8L0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6fqP3Y9c-bPgKF468Nogya8ml8G-7hJNYCUMXt75FEnjvEhNvyIkG1oCalJEzKj7OS_DeztiF_MZfnNa13f_DzOPlYbfRrfi3ZWzxC4VycDGo0>
Online
Class
11/11/2024 - 22/11/2024
$3000
Mombasa
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLYjCK4K8Q9Uht687xqLFSZmn918Ws-s4W_M5TS4sYNRyETZcPX8mmDaNXnYtaaWTGTytnNbRVHhsRbdMhVqEtdRfBebrWjbcXSSFdqlU8KFxW0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6x31rBn_7o7eZ5zga8tPaG_beX1OQcuN9DBaoI_dnVEu29QujvEWbZs9yCfdJ5xBx4URL4p5JoNTev1_Rx-PFqk-ek82dW0r01Lq9uz1C4QNC0>
Online
Class
09/12/2024 - 20/12/2024
$3000
Nairobi
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpaiTMzfrhlTYEIPfZz6Z3CLmbZ-BHWErH5Z_kuMjfTy4fGINAi62hUU3rLY-f8HbZmwIf6ki-a6b9uHt65_BAeonLAmgN86E0vkiuidvvsSUp2Q-trMDgc-3mK6rIEeTxho0>
Physical Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=hN5jFUOvPkcFSmi7GegJWGoIDOLmcjW4uRG2Ar2SvpYNp3bWb_jo-R4OSyVYQug6SBba7NkaFADXAdcN_XuGBstJ-0UR43U9wRKmovdBT_m9Lx3cmjnzcDkkwcPnbB6aFxmaWJWiurEpKaAosM2fv0EUYNNa45us6w7RxobwOHaP0>
Online
Class
<http://tracking.skillsforafrica.co.ke/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KMSa90TlGCKKJ5hIH4i_iwQ5f7pT6EDj0xmTw0vZNMuwG5OO-fhWSu8SF4lx7iuqcNpyuHT1-RpA8l8p6Ay7aXc83P_kJRs_fgnH3eZ8ZuhNnU1>
Calendar for 2024
Workshops
<http://tracking.skillsforafrica.co.ke/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KNeMtBVqwr0Ob8EtQE8EtVEUtNGdJcJWjZHJwXWXak5hTtSfhcRDcIYm-jimKvYj22D3-LTH5pU9UvRqeqFlg6lyl3XfwAac5GK5ppgLDrRLaE1>
Contact us
<http://tracking.skillsforafrica.co.ke/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejgUscRk74HwXZ5MAiUpbCVgxiAixOFUlOejV7wbktYYvXxjHMEp1Xq7rzgrPJKyzpoDxFR8lCiCslHsoWy9pX1sr6zJYopYY5n3CSj8nM5bhrQ1>
Whatapp
Office
Telephone: +254-702-249-449
Register
as a group of 5 for the price of 4 on the course fee.
Send
us an email:
<http://tracking.skillsforafrica.co.ke/tracking/click?d=ra_Krquym_vAH7a0xfyiRRRJ0mmMognyg56kmPeJDcOATg5hRkN4jmHMwEzF0zgtO48KNNuLGUdwlG1qKjUnbUM2IeT0IcOWbfJllT42JsXf6Y19QhWC8oKCg0wGVhMM8dMJxiCpXSV51OPtubIGYY2TbC5uFzFAusdLKekoL0VdkjIhHCszN5V_7j8FX-DyUHgSZnGOqJ2ppXohStC8bNHj7ABOot5b1OOkdzOqPihB0>
training at skillsforafrica.org or
call +254-702-249-449
INTRODUCTION
Information
and know-how are valuable company assets, and in times of fierce competition,
organizations need to protect their information and systems against the threat
of corporate espionage. Many organizations are unaware of potential information
leaks, and as a result counterintelligence operations are neglected or are
simply a series of routine technical measures. However, employees typically
represent a major weak spot for organizations – which means that existing
processes and structures for information flows need to be challenged. Empirical
research indicates that most information losses are traced back to a company’s
employees, or the personnel of its suppliers, customers, or partners – all of
whom have access to confidential information. The training will look at the
different threats organizations might face and ways in which they can protect
and secure it against attacks. Participants will also learn how to set up
counterintelligence processes that involve collecting information and conducting
counterintelligence activities.
Course
Objectives
By
the end of this course, participants should be able to:
Know
the purpose of a cybersecurity audit
Define
cybersecurity audit controls
Identify
cybersecurity audit frameworks
Explain
proper audit team performance
Define
the benefits of a cybersecurity audit
Learn
how to identify vulnerable points within your organization and how to secure
them.
Run
awareness campaigns among your colleagues in order to raise awareness of
espionage threats and protect them from attacks.
Develop
in-depth knowledge of the various forms of contemporary espionage
threats.
Master
how to identify, monitor, and evaluate information
risks.
Become
familiar with ethical and legal counterintelligence activities and
techniques.
Seize
the opportunity to share experience and knowledge with competitive/market
intelligence experts and peers from a range of
industries.
Duration
10 Days
Who should Attend
Individuals
involved in cybersecurity management
Learning
and development professionals
Internal
auditors
IT
professionals and managers working with information systems, who need to
understand best practices and standards to ensure security and integrity of
these systems
Individuals
seeking to gain knowledge about the main processes of auditing a cybersecurity
program
Individuals
interested to pursue a career in cybersecurity audit
Competitive/Market
Intelligence Analysts and Managers
Knowledge
and Information Managers
Specialists
from R&D, Technology and Risk Management
COURSE CONTENT
What
is a Cybersecurity Audit?
Introduction
What
is a Cybersecurity Audit?
When
to Perform a Cybersecurity Audit
Controls
and Frameworks
Cybersecurity
Audit Controls
Cybersecurity
Audit Frameworks
Completing
the Audit
The
Audit
Audit
Completion
Understanding
Cyber Threat Intelligence
Defining
Threats
Understanding
Risk
Cyber
Threat Intelligence and Its Role
Expectation
of Organizations and Analysts
Diamond
Model and Activity Groups
Four
Types of Threat Detection
Process
of auditing information systems
Governance
and management of IT
Information
systems’ acquisition, development and implementation
Protection
of information assets
Information
systems’ operation, maintenance and service management
Threat
Intelligence Consumption
Sliding
Scale of Cybersecurity
Consuming
Intelligence for Different Goals
Enabling
Other Teams with Intelligence
Positioning
the Team to Generate Intelligence
Building
an Intelligence Team
Positioning
the Team in the Organization
Prerequisites
for Intelligence Generation
Planning
and Direction (Developing Requirements)
Intelligence
Requirements
Priority
Intelligence Requirements
Beginning
the Intelligence Lifecycle
Threat
Modeling
Recent
cybercrime trends
Cyberwar
attacks leading to the shutdown of production facilities or utilities (e.g.
Stuxnet, Emotet).
Ransomware
trojans and smart viruses.
Recent
espionage threats and protection
Risk
audits: Identification, monitoring, and evaluation of risks for information
theft.
Electronic
eavesdropping — reality or fiction?
Audio-visual
information gathering.
Product
piracy.
Information
drainage through social engineering
Threats:
Elicitation, back-door recruitment, external personnel, Romeo approaches,
social media activities (sockpuppets), and pretext
calls.
Protection:
Vulnerability analysis, employee training, and never-talk-to-strangers
policies.
Security
of data and communication networks
Protection
against hacking and orchestrated attacks.
The
weak spot — exploiting the human factor.
Opportunities
and limitations for technical counterintelligence
solutions.
Secure
communication: Safe data transfer methods, minimization of communication
risks, and protection of corporate communication
structures.
Internet:
How to securely conduct research, transfer data, and avoid harmful
software.
Illustration
of attacks with numerous small case studies.
Counterintelligence:
The role of CI/MI professionals in espionage
protection.
Prevention
campaigns.
Penetration
tests for an outside-in perspective.
Briefing/de-briefing
of colleagues with sensitive external contacts.
Training
Approach
This
course is delivered by our seasoned trainers who have vast experience as expert
professionals in the respective fields of practice. The course is taught through
a mix of practical activities, theory, group works and case
studies.
Training
manuals and additional reference materials are provided to the
participants.
Certification
Upon
successful completion of this course, participants will be issued with a
certificate.
THE END
<http://tracking.skillsforafrica.co.ke/tracking/unsubscribe?d=KxypFTpHc1_SkJKdiUORSA1TzwGQP1b0Idlp7yFNCT9cF7wXVlne9zPrtmpaNxowzStQ4UUAf0Vzt0nLuzpe-uilGNvSr6s0NAMgNKIE1t-K4jSphr9YEueQxd2mSY0l9w2>
UNSUBSCRIBE
<http://tracking.skillsforafrica.co.ke/tracking/botclick?msgid=OAMd_VqrbVLG5xg6q1OKMg2&c=1493392764631762477>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.reproducible-builds.org/pipermail/rb-commits/attachments/20240430/cc463cc1/attachment.htm>
More information about the rb-commits
mailing list