Corporate Training
Overview
In today's digital age, the very fabric of our daily lives is woven with threads of technology. From personal emails to sensitive business data, our reliance on digital platforms is undeniable. But with this digital empowerment comes vulnerability. Cyber threats are evolving, and growing more sophisticated daily, targeting individuals and businesses alike. So, how prepared are you to defend against the unseen?
Introducing a game-changing solution: Comprehensive Cybersecurity Awareness Training. More than just an educational program, this is your key to empowering and safeguarding your digital universe.
Select your module(s)
You can select the modules you want to learn. Theres a specific order in the learning curve for some obvious reason, unless you already know something and wants to go farther.
Module 1 - Information Security Governance
Lesson 1: Enterprise Governance, 120min of course
1.1 Information and Cybersecurity Fundamentals
1.2 Information Security Governance
1.3 Governance Roles and Responsibilities
1.4 Governance Documents
1.5 Regulatory and Compliance Requirements
Lesson 2: Information Security Strategy, 100min of course
2.1 Strategy Development
2.2 Information Security Governance Frameworks
2.3 Building a Business Case
2.4 Metrics and Indicators
2.5 Audit and Assurance
Module 2 - Information Security Risk Management
Lesson 3: Risk Landscape, 80min of course
3.1 Risk Concept
3.2 Vulnerability Identification
3.3 Penetration Testing
3.4 Threat Actors and Attributes
3.5 Threat Modeling
Lesson 4: Risk Management, 80min of course
4.1 Risk Governance
4.2 Risk Assessment
4.3 Risk Analysis
4.4 Risk Response
4.5 Risk Monitoring
Module 3 - Information Security Program Development and Management
Lesson 5: Information Security Program Development, 80min of course
5.1 InfoSec Program Ecosystem
5.2 Information Security Frameworks and Benchmarks
5.3 Information Security Metrics
5.4 SETA Principles and Practices
5.5 Risk Monitoring
Lesson 6: Information Security Program Management, 130min of course
6.1 Asset Classification
6.2 Controls and Countermeasures
6.3 Control Baselines
6.4 Configuration Management
6.5 Change Control
6.6 Vulnerability and Patch Management
6.7 SDLC and Collaboration
6.8 Cloud Computing
6.9 Vendor and Supply Management
Lesson 7: Secure Design and Implementation,
190min of course
7.1 Secure Design Principles
7.2 Security Zones
7.3 Wireless Connectivity
7.4 Firewalls
7.5 Network Access Control
7.6 Access Control Management
7.7 Cryptographic Primer
7.8 Encryption
7.9 Hashing and Digital Signatures
7.10 PKI and Digital Certificates
7.11 Secure Protocols
7.12 Site and Building Security
Module 4 - Incident Management
Lesson 8: Incident Management, 80min of course
8.1 Incident Management Planning
8.2 Business Impact Analysis
8.3 Resiliency Concepts
8.4 Backup and Recovery
8.5 Security Incident Response Planning
8.6 Disaster Recovery and Business Continuity Plan
8.7 Plan Readiness
Lesson 9: Attack Vectors, 80min of course
9.1 Malware
9.2 Social Engineering
9.3 Digital Infrastructure Attacks
9.4 Validation Attacks
9.5 Environmental Impact
Lesson 10: Security Incident Response, 90min of course
10.1 Incident Response
10.2 Detection and Response Tools
10.3 Evidence Handling
10.4 Forensic Examination
10.5 Disclosure and Notification
Lesson 1: Attack Vectors, 80min of course
1.1 Malware
1.2 Social Engineering
1.3 Digital Infrastructure Attacks
1.4 Validation Attacks
1.5 Environmental Impact
By the end of this course, you'll receive a Diploma in: