TRAINING COURSE ON ADVANCED CYBER SECURITY, SYSTEMS AUDIT AND ICT COUNTER INTELLIGENCE SOLUTIONS
Skills for Africa Training Institute
workshops at skillsforafrica.or.ke
Tue Mar 21 21:47:38 AEDT 2023
<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KOKTELeLsJYhfgt9Th06IMPtplKOu8CoQO1CNMZk-P-Bghc8za17HlmO1LpCM98Js6pIlQ7V6k25OG7XeVdHZliN5kj8iq658auztb7eGh-eTI1>
TRAINING COURSE ON ADVANCED CYBER SECURITY, SYSTEMS AUDIT
AND ICT COUNTER INTELLIGENCE SOLUTIONS
Dates
Fees
Location
Apply
03/04/2023 - 14/04/2023
$2700
Nairobi
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPz1XSRvyIAkhUB-GocUKVgWupwH_UXFVztz6tFQ_oZlbe4R4bsnJwXDVbiTtGXtky8yNw_Wx3GpuhVgx3issW6-Gft4ygdZk-Xad0G9-uqv5F0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu-wo7dEZX17PRQa4W24MsrF8Rg31JyOx73nG-lekXpZcq4qKXkyUf__qLafS3GDQ90QAzQx0akrOxbc7j4AM6q8PzkAts4OY4pthhVr3sMJXl0>
Online
Class
01/05/2023 - 12/05/2023
$4500
Dubai
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPMops7yuZFSvWMM1Oyz38HfGCwGEw1pgeNuwD1zYYMun8UzfqXlPr3cF6Ug4c5S-0fgLq9FSAXcbAced_JAnl0RSpfvqx3W__pcfOpN7WTffc0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu66hqz-Yz9mRwu3uFv4JyWkMpg1Y4pVVge8-IKHA2zTwDPoP9xVigPHGyuBpFpwkIZFRM5OVsH7_EhHhi1faKTlvumRBsek6VBwoeI6UsPwLh0>
Online
Class
05/06/2023 - 16/06/2023
$3000
Mombasa
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPD6WjIQeom6yFvbSSXRrlP_OSyy1KewVTkBNaiyCpHjdOrcmeU-MVD-DWnewhSdnXQE2uJfkYGjPxtGrzpiUlR9PmR-Q7_mRPD7KO3-WSn-9s0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu2SUTLivnKNEITo7Ca0Rlw8Mwu-RVKZkvXdHYJF0MVUuVql9a0ws0VZZEAdBgMtmVBEAZUqhvnjsYksvNZhA1lIPgxa6cMlerOr6vvnnlFXEu0>
Online
Class
03/07/2023 - 14/07/2023
$3500
Kigali
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPHLYElh3rVtmxwTcVoHT0AyJveSKgzRIrY40AbpwjtrJ6U3h53MdIZUsYCAbHzaNFpywyhi0FfTTahpwZUoX7tcBGjl0mOm03MrLSEEDlUQeQ0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuszF7i2eyLzBmgWqxbz3jG4-HCfOJyqJftvrtBxeM5GJj-CoWBNIdo2HWSLG-OVGOR_eP1CNN73-L7RPPXU0tCTy2H3eNsbZwDecA3oIsgL7e0>
Online
Class
07/08/2023 - 18/08/2023
$2700
Nairobi
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPZURmlAv6TWXZdI3vi8W1vn9zWfwFBRKvhPktFeGKpL4HftSu13drvbz34NTwGjx9_05scfhrWLbr0BNTp4ld5bRlyjp7sJS_Hc9fKY-2BFOQ0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuy7t7852ZvRYCcboHwu639oyFcmaNZWKwihrD6rHISH_IYOBx6MUpM6i0QWSKkfGWYG1tmrFlum_DREeni4jL4BWcfMGdVR4SP2MrC8NLEUmK0>
Online
Class
04/09/2023 - 15/09/2023
$3000
Mombasa
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoP7LvxaSuNMSEjy8xBKCOL3v_IMQXQZ8ephKyFcEz30PTVDpcTDOuuIaAnKnPdoolQQDKBzHGKwMAThWEzJkndbNhn3nUxKRRva6-y_nb2W7j70>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuEnYejjYVpBX3ux71bNScyAv2X2izzLdl_zFvUocHy1A_GljDnY1TxHNicP7e7LL9rZxA4tMlkB34JmNgh5uTYV7KlT1ss2mbCX2-TKNSsCPO0>
Online
Class
02/10/2023 - 13/10/2023
$3500
Kigali
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPnxmkNKl_7nOiA3u_8W96Cj-xEHz-ZQdccQF-f0oYnF0qWBhATFnVg3MptgzdfrQNRNPk-n1HHQpMcEOMwdbnkeU4w0pW2O0w5fizrmQ9HXkp0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuRN1AphA0dSB9E7GTmhLVvZHl7s4lifW3o4n99x-bRevbCLgn1tPK_sgd3o7OIs2brXRtO3CzGDAEuHMOXTPFKUA5An-JDkLBNZiXlr_dLDcj0>
Online
Class
06/11/2023 - 17/11/2023
$3000
Mombasa
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPXCNySif4KN8awqurUH2pqbPcyBSYc8ffX57l47u-EfnfLAIbV1OqLyZeH6-5iVV0XoQQPVZH0jgwFJKbTswzfT7d5R00YEwnZZfNqPyT-mdA0>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu5nYqfNRyrIP3MeahnDzJl326JcfXX2u7i0OHt_6NWV2AQ1cMSS3bVF8tsRuG18zaualsJpIlPd5Sio-EC9MkXFqnzKZ5ygfcvsnYK5pqu1zk0>
Online
Class
04/12/2023 - 15/12/2023
$2700
Nairobi
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoP-cfvvy2N6mAJuwXhiOLaAfdr8u5kqkSYfjyziI9HUY41FOswViiD7hhR1F2DsVzPxAzA_1vGy3yNfFyRM8pivbnAqxOdMGnBsrogQzrUPxh60>
Physical Class
<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuIg076mKnfpJuxAYhAD6_MF7icEopfQKMx6-JplwwomV5jdTc8bgK8-sj4kty5esteSlvXAr6T25_-OMkfe1yh1yV0e9tpVcg_JRScTTI2neL0>
Online
Class
<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KNTFFNY6jLTlannTsFNp1-e1z5g6rEUHbt55mwlwZDUhn9uselQOk42TotDFnXWYSu2ZNo0HwAUtp2tBKLb2i1bUy8_Ao6beGm2WPBaRf3YzB01>
Calendar for 2023
Workshops
<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KM-cgdd93er8oiDD9RVWshiXMnib3cnotGmowFp7Ezw6BUgcb4Gkpq7ORsyGeH48sqdSUAN3uGMgN9_oIMVG7_joH9letWYG40ZabtHfu_pCnY1>
Contact
us
<https://133IK.trk.elasticemail.com/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejjxKwO9e8XGsKnbIiI6uZ9PnCQ35zRWcc5xCYNDPevfULxmWv1FazMyy0NdExLXGcH8XsBh0-yJ51AcyAHpNft1Ph6J_VmBBcWUjlgchx5tIYE1>
Whatapp
INTRODUCTION
Information
and know-how are valuable company assets, and in times of fierce competition,
organizations need to protect their information and systems against the threat
of corporate espionage. Many organizations are unaware of potential information
leaks, and as a result counterintelligence operations are neglected or are
simply a series of routine technical measures. However, employees typically
represent a major weak spot for organizations – which means that existing
processes and structures for information flows need to be
challenged.
Empirical
research indicates that most information losses are traced back to a company’s
employees, or the personnel of its suppliers, customers, or partners – all of
whom have access to confidential information.
The
training will look at the different threats organizations might face and ways in
which they can protect and secure it against attacks. Participants will also
learn how to set up counterintelligence processes that involve collecting
information and conducting counterintelligence activities.
Course
Objectives
By
the end of this course, participants should be able to:
·
Know the purpose of a
cybersecurity audit
·
Define cybersecurity audit
controls
·
Identify cybersecurity audit
frameworks
·
Explain proper audit team
performance
·
Define the benefits of a
cybersecurity audit
·
Learn how to identify vulnerable
points within your organization and how to secure them.
Run
awareness campaigns among your colleagues in order to raise awareness of
espionage threats and protect them from attacks.
Develop
in-depth knowledge of the various forms of contemporary espionage
threats.
Master
how to identify, monitor, and evaluate information
risks.
Become
familiar with ethical and legal counterintelligence activities and
techniques.
Seize
the opportunity to share experience and knowledge with competitive/market
intelligence experts and peers from a range of industries.
Duration
14
Days
Who
should Attend
·
Individuals involved in
cybersecurity management
·
Learning and development
professionals
·
Internal
auditors
IT
professionals and managers working with information systems, who need to
understand best practices and standards to ensure security and integrity of
these systems
·
Individuals seeking to gain
knowledge about the main processes of auditing a cybersecurity
program
·
Individuals interested to pursue
a career in cybersecurity audit
Competitive/Market
Intelligence Analysts and Managers
Knowledge
and Information Managers
Specialists
from R&D, Technology and Risk Management
COURSE
CONTENT
What
is a Cybersecurity Audit?
·
Introduction
·
What is a Cybersecurity
Audit?
·
When to Perform a Cybersecurity
Audit
Controls
and Frameworks
·
Cybersecurity Audit
Controls
·
Cybersecurity Audit
Frameworks
Completing
the Audit
·
The Audit
·
Audit
Completion
Understanding
Cyber Threat Intelligence
·
Defining
Threats
·
Understanding
Risk
·
Cyber Threat Intelligence and
Its Role
·
Expectation of Organizations and
Analysts
·
Diamond Model and Activity
Groups
·
Four Types of Threat
Detection
·
Process of auditing information
systems
·
Governance and management of
IT
·
Information systems’
acquisition, development and implementation
·
Protection of information
assets
·
Information systems’ operation,
maintenance and service management
Threat
Intelligence Consumption
·
Sliding Scale of
Cybersecurity
·
Consuming Intelligence for
Different Goals
·
Enabling Other Teams with
Intelligence
Positioning
the Team to Generate Intelligence
·
Building an Intelligence
Team
·
Positioning the Team in the
Organization
·
Prerequisites for Intelligence
Generation
Planning
and Direction (Developing Requirements)
·
Intelligence
Requirements
·
Priority Intelligence
Requirements
·
Beginning the Intelligence
Lifecycle
·
Threat
Modeling
Recent
cybercrime trends
·
Cyberwar attacks leading to the
shutdown of production facilities or utilities (e.g. Stuxnet,
Emotet).
·
Ransomware trojans and smart
viruses.
Recent
espionage threats and protection
·
Risk audits: Identification,
monitoring, and evaluation of risks for information theft.
·
Electronic eavesdropping —
reality or fiction?
·
Audio-visual information
gathering.
·
Product piracy.
Information
drainage through social engineering
·
Threats: Elicitation, back-door
recruitment, external personnel, Romeo approaches, social media activities
(sockpuppets), and pretext calls.
·
Protection: Vulnerability
analysis, employee training, and never-talk-to-strangers
policies.
Security
of data and communication networks
·
Protection against hacking and
orchestrated attacks.
·
The weak spot — exploiting the
human factor.
·
Opportunities and limitations
for technical counterintelligence solutions.
·
Secure communication: Safe data
transfer methods, minimization of communication risks, and protection of
corporate communication structures.
·
Internet: How to securely
conduct research, transfer data, and avoid harmful
software.
·
Illustration of attacks with
numerous small case studies.
Counterintelligence:
The role of CI/MI professionals in espionage
protection.
·
Prevention
campaigns.
·
Penetration tests for an
outside-in perspective.
·
Briefing/de-briefing of
colleagues with sensitive external contacts.
THE
END
<https://133IK.trk.elasticemail.com/tracking/unsubscribe?d=l2qI7mVzmWlm-je8spg6N0qL9C6YbpsuAhvukERlTAikVbLs94H-Z9wke40qqD0yjg75DYE5zFr6gYj2dQbFVTJJQxNEvgG8bWwP5-Ulsosw0>
UNSUBSCRIBE
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/linux-erofs/attachments/20230321/03f377b7/attachment.htm>
More information about the Linux-erofs
mailing list