Cyber Security & Resilience for Critical National Infrastructure and Technologies.
May 30 - May 31
Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. There will be live demonstrations of end-to-end attacks and real-world case studies.
Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.
What you will learn from this Masterclass:
- APPLY knowledge of offensive and defensive cyber security.
- EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
- IDENTIFY the technical, procedural and human requirements for defensive activities.
- MEASURE the effectiveness of security controls using security audits and monitoring.
- NAVIGATE the cyber security threat landscape.
- OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
Director, Head of Department, Managers, Supervisors, Executives and Officers of:
- Counter-Intelligence Investigation
- Human Resources
- Information Security
- Information Technology (IT)
- Insider Threat Analysts
- Insider Threat Program Managers
- Network Administration
- Physical Security
- Software Engineering
Expert Trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management. He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.
Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.
Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.
Live end-to-end attack demonstrations.
A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.
The attack chain.
Case studies/examples of different types of attacks. Please elaborate more. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks.
Defensive case studies/examples.
A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks. A number of specific examples from the instructor’s personal and professional experience will be given, including taking a layered approach to security, and protecting against human threats.
Interested to be part of this training?
Please contact us at firstname.lastname@example.org to discuss your requirements.
Hotel venue to be confirmed.