Data Security (Technical)

Description:

The course runs over 6 weeks and is broken down into manageable weekly topics: 
Week 1: Introduction 
(The current cyber security environment; Business impacts and costs; Legal and regulatory requirements) 
Week 2: (Common vulnerabilities from CWE, OWASP, STRIDE ; Humans in the loop, social engineering, vishing, phishing, malware, spoofing ; Selecting appropriate controls) 
Week 3:(Risk assessment; Step-by-step guide to conducting a risk assessment; Cyber essentials scheme) 
Week 4: (Tools and techniques for vulnerability assessment; Introduction to Rob the Data)
Week 5: (Rob the Data) 
Week 6: (How to communicate cyber risks to management; The role of incident-planning; Resources_ 

After successfully completing the course, you’ll be able to:

– Understand security governance requirements and the legal aspects of cyber security as they apply to IT systems
– Identify the various types of vulnerabilities and threat vectors IT systems are susceptible to
– Suggest the cyber control needed to reduce IT threat vectors
– Understand the implications of various strategies used to mitigate a cyber-attack
– Understand an organisation’s security architecture
– Conduct vulnerability assessments of your organisation’s IT systems

Minimum 25 students.

Email us for more information:

info@esensomk.com

info@chabukaisix.co.uk