|
[PyFeyn] TRAINING COURSE ON ADVANCED CYBER SECURITY, SYSTEMS AUDIT AND ICT COUNTER INTELLIGENCE SOLUTIONSSkills for Africa Training Institute workshops at skillsforafrica.or.keTue Mar 21 11:02:27 GMT 2023
<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KOKTELeLsJYhfgt9Th06IMPmJa5k084BdLcnKbgvhYeGCu-AdG4yTlsufg-6rZK1DM5-l75leIM3xDJAwDA8wH2ud-fGHsGs3tLQjAk8JJ1Fns1> TRAINING COURSE ON ADVANCED CYBER SECURITY, SYSTEMS AUDIT AND ICT COUNTER INTELLIGENCE SOLUTIONS Dates Fees Location Apply 03/04/2023 - 14/04/2023 $2700 Nairobi <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPC4igJv5jy6PFafBII7I1d3ZC8M0glRvxFQIZGre3WDPEyR1zBG_ys1a9yflTmtbRPuMPwX4MLnnMY-kf9vMH8wLVl6DSyzuSKIdn385Jwvgs0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuXqL3F8TfDg39wEdaTekhqWod1-GRpLwjF5BAStj0TETA1UINJKqfpXKxXbfc-hmhdVeOT53x1mJMsbywSv2jBMpFX0H0sC0DhX95cHXaKBHI0> Online Class 01/05/2023 - 12/05/2023 $4500 Dubai <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPOVZb7VNhhkPeE5Z03wAIVsdTzEGZx4lmAdNx2OO7SoU-RSOdOXVuC3D1hSbG1inSQvGuTzfzBX4BAqG0pHqmZQ3IHGW9AiDn29fYnWr15mJx0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuew4lFDvGwVyMDcJwo5xbXCg6Q1OnZDdqTlftmtrGyo60OYviqqAYLrSDwITCICMbm1X9CkOjw5kR98ZaSeEgys9NBbqercFvuq8qP7DOo2xb0> Online Class 05/06/2023 - 16/06/2023 $3000 Mombasa <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPy-qvfWta1RPh5l1Qw_ig45laKvxuft0h0-KYLRjU3tOnyEngpINrHb6lrf5bJvWvDQK2ioTGQ7_EF0Msb_MiX2oulHrkIe_bmLwYgNvEa0PW0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuh07ejP5MeecpmzZGHDM3EsHL5l32rEOQakYQMaunVTG-sDalMEVtJZexHw3f8QBEWsuMZTeMBGNXVxYCVBRkvcGyHXqhcwEE-LmCGIpk7xfa0> Online Class 03/07/2023 - 14/07/2023 $3500 Kigali <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPisD_mkMzLexK8RuyNj88sE9WYPnm524e6ztOU2LA3jUvJUY_5crr3NScfFKzzei4ofcGBSY8vDW2ZpqOwzphtE4FbV7ilMH6eM2vCLF07On40> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMul41DPGYMBWKXGQO6i5FUXyABugtlW31Kb6Ek2u5C88JNXOi7bHF1drSfNRGhftTAZi7xnssMra8UOjYkJb80r6MAbGCemZpnl2m0P60WJQkL0> Online Class 07/08/2023 - 18/08/2023 $2700 Nairobi <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPL7ZThI_hKD7O25UTiVCzQSZhvyZO9KmOkhSnDXFLz8qwrBrY6CAeGMH0AN17ksjKwhhdf_ZeoUoaxZ4VGHFEBT8nJEQjmJBGYaQm9eM-S-6_0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuoaKMWd8w8UNHvfGm1ORecj7-wn6lto6hdwEemPwyuuKip5C8rT2MSgfKfHk_6nf6nhpreThqDqiYq9WrpGdpOq0uHoWu6Pwgz17Xvvo7fZ4r0> Online Class 04/09/2023 - 15/09/2023 $3000 Mombasa <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPET-M3hOUJ8L952hnp2V1uJljWZV9uw-lJWUzwneUJHIyd5GQK9rIcGR2Di3UmxA674aReouhoJNO9C0ZkrDe5EFQcSIErdTGNIj35B8p7JbI0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMugDZQpL8V8Mtap5y2felJUpOetS1pms3FRntOtg7ONFTZ2XaotmcNeYOPehn0rOKkf_BPdCvN0l5oasFe86iRd2OvKKZkV41sGzxz1feX09Ey0> Online Class 02/10/2023 - 13/10/2023 $3500 Kigali <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPfarjk_VZy9BdcI2uAgnFwxJtU-4VqC2x6th8Bf0eNjSs9dlnsYg0piqRMfy0FKTi_2tLQMBEAGSAizRCBs9M96uy3m9fgzZrjlqtLNh09H6c0> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuYCQEjJH3ANbQ9wVoXprwvLMvcnvnWAp8dQGY5WzO9l8iVOQWed72dTfdWa4Zw4JoSvvW69oncVAj_brMQDCwgvqgyREp30acD86MVb7Bkzkt0> Online Class 06/11/2023 - 17/11/2023 $3000 Mombasa <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPguqIjR6Hl0po_2ZCmZUxDy4rO9M-cOZlJzag3CCSrL5s0nOt9VqSktpcBq4ggcwydxhY8zxXo578g4ecLYq3YEYiZuTEuamWrODsCVXVzve70> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu8uLb1StPwYNoYZGwowpxbrqq_O9GArI8OqhGfNsCFQ-Qck0urIVBby0glMBcEJ-sfPpECo3DKxbFDL5vGvcIdrFXaJAbhUMFNyctoCyUmkyW0> Online Class 04/12/2023 - 15/12/2023 $2700 Nairobi <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPPabceaxK13ZBtVfEQFqPz1MxuhYQZMYACL3lrDom6uQ_IRJmEASNrPbitGC3fU_vxlJGpHBqzwWCpGlBARmRjPAPULJken55X77O4QiHr3i00> Physical Class <https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu39iQPqPRyvSqU8n0F8S4rFefIGbcydPWzG_6qy_THfMCpXpk6UTC1m4100CKAm_Zom1yI-69D2UwiYuZMDWqHuYC403np-XOJccMItCzO1DR0> Online Class <https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KNTFFNY6jLTlannTsFNp1-e46cmAEy6DP3luHrGg2RPnERIb3KWbbevUkUBmS9Dl0HmAqsdCzOB_K9c28JhdEVVC2l3BViR5JzK2s9pUwLlGmk1> Calendar for 2023 Workshops <https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KM-cgdd93er8oiDD9RVWshiMmf2V2dozLdKIALaYUFbin8-To607Wm0aKAtVfHM9jtVgbaCNpXj7X75h-VU41-WR2jdSjCmsLjeb1L2ICLrrm81> Contact us <https://133IK.trk.elasticemail.com/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejjxKwO9e8XGsKnbIiI6uZ9PJp2lkiYRlxT4P3CF_ykhbS-49KHbRQQWxs3oMGAQbp5B2rtoshmPw5RPjQ7bbss_mbZ-G0noW7KOlAjBjyPsRnQ1> Whatapp INTRODUCTION Information and know-how are valuable company assets, and in times of fierce competition, organizations need to protect their information and systems against the threat of corporate espionage. Many organizations are unaware of potential information leaks, and as a result counterintelligence operations are neglected or are simply a series of routine technical measures. However, employees typically represent a major weak spot for organizations – which means that existing processes and structures for information flows need to be challenged. Empirical research indicates that most information losses are traced back to a company’s employees, or the personnel of its suppliers, customers, or partners – all of whom have access to confidential information. The training will look at the different threats organizations might face and ways in which they can protect and secure it against attacks. Participants will also learn how to set up counterintelligence processes that involve collecting information and conducting counterintelligence activities. Course Objectives By the end of this course, participants should be able to: · Know the purpose of a cybersecurity audit · Define cybersecurity audit controls · Identify cybersecurity audit frameworks · Explain proper audit team performance · Define the benefits of a cybersecurity audit · Learn how to identify vulnerable points within your organization and how to secure them. Run awareness campaigns among your colleagues in order to raise awareness of espionage threats and protect them from attacks. Develop in-depth knowledge of the various forms of contemporary espionage threats. Master how to identify, monitor, and evaluate information risks. Become familiar with ethical and legal counterintelligence activities and techniques. Seize the opportunity to share experience and knowledge with competitive/market intelligence experts and peers from a range of industries. Duration 14 Days Who should Attend · Individuals involved in cybersecurity management · Learning and development professionals · Internal auditors IT professionals and managers working with information systems, who need to understand best practices and standards to ensure security and integrity of these systems · Individuals seeking to gain knowledge about the main processes of auditing a cybersecurity program · Individuals interested to pursue a career in cybersecurity audit Competitive/Market Intelligence Analysts and Managers Knowledge and Information Managers Specialists from R&D, Technology and Risk Management COURSE CONTENT What is a Cybersecurity Audit? · Introduction · What is a Cybersecurity Audit? · When to Perform a Cybersecurity Audit Controls and Frameworks · Cybersecurity Audit Controls · Cybersecurity Audit Frameworks Completing the Audit · The Audit · Audit Completion Understanding Cyber Threat Intelligence · Defining Threats · Understanding Risk · Cyber Threat Intelligence and Its Role · Expectation of Organizations and Analysts · Diamond Model and Activity Groups · Four Types of Threat Detection · Process of auditing information systems · Governance and management of IT · Information systems’ acquisition, development and implementation · Protection of information assets · Information systems’ operation, maintenance and service management Threat Intelligence Consumption · Sliding Scale of Cybersecurity · Consuming Intelligence for Different Goals · Enabling Other Teams with Intelligence Positioning the Team to Generate Intelligence · Building an Intelligence Team · Positioning the Team in the Organization · Prerequisites for Intelligence Generation Planning and Direction (Developing Requirements) · Intelligence Requirements · Priority Intelligence Requirements · Beginning the Intelligence Lifecycle · Threat Modeling Recent cybercrime trends · Cyberwar attacks leading to the shutdown of production facilities or utilities (e.g. Stuxnet, Emotet). · Ransomware trojans and smart viruses. Recent espionage threats and protection · Risk audits: Identification, monitoring, and evaluation of risks for information theft. · Electronic eavesdropping — reality or fiction? · Audio-visual information gathering. · Product piracy. Information drainage through social engineering · Threats: Elicitation, back-door recruitment, external personnel, Romeo approaches, social media activities (sockpuppets), and pretext calls. · Protection: Vulnerability analysis, employee training, and never-talk-to-strangers policies. Security of data and communication networks · Protection against hacking and orchestrated attacks. · The weak spot — exploiting the human factor. · Opportunities and limitations for technical counterintelligence solutions. · Secure communication: Safe data transfer methods, minimization of communication risks, and protection of corporate communication structures. · Internet: How to securely conduct research, transfer data, and avoid harmful software. · Illustration of attacks with numerous small case studies. Counterintelligence: The role of CI/MI professionals in espionage protection. · Prevention campaigns. · Penetration tests for an outside-in perspective. · Briefing/de-briefing of colleagues with sensitive external contacts. THE END <https://133IK.trk.elasticemail.com/tracking/unsubscribe?d=iFsE0jaCzNIchabGyKkNYnNh3R5ZDU1CymtjYORz6oWizBfKoihBmC9eQPPatyM5wnwKf3Dlal0gmPOz6OSL4ZBDk9U6ILpvy-bQQk0KFcRH0> UNSUBSCRIBE -------------- next part -------------- An HTML attachment was scrubbed... URL: <https://www.hepforge.org/lists-archive/pyfeyn/attachments/20230321/ff154b41/attachment.html>
More information about the PyFeyn mailing list |