Cyber Crime Protect Training
Select Other "city & date"
Cyber Crime Protect Training Course
Introduction:
Step into a world of immersive learning with the accelerated Cyber Crime Protect course, where you'll gain a comprehensive understanding of information security management concepts in just five days.
Throughout this program, you'll discover the keys to effectively collaborating with IT and security professionals, ensuring that risks across IT infrastructure are minimized. By expanding your knowledge of IT technology, this cyber awareness training will empower you to navigate the complexities of information security management.
You'll dive into the fundamental components of IT infrastructure, gaining insights into its intricate workings. Risk management will be at the forefront of your training, equipping you with the skills to identify and mitigate potential threats. From there, you'll explore the protective measures necessary to safeguard information systems against cyber threats.
An integral part of this course is understanding the controls used to fortify IT systems. Through hands-on individual and group exercises, you'll tackle real-world scenarios that demand your proactive thinking and require the implementation of preventative measures.
Prepare yourself for an intensive journey into the realm of information security management. Join us on this accelerated cyber awareness course and emerge with the knowledge and practical skills to combat cybercrime effectively.
Course Objectives:
- You'll be trained in just 5 days. You'll learn fast when you're taught by law enforcement professionals
- You’ll learn more. Get immersed in the world of cybercrime as you learn from instructors with experience in cybercrime operations and policing
- You’ll learn faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
Course Outlines:
Scripting
Automating operating system and network activities for the extraction and analysis of data from computing devices.
Information security management
Risk and threat and how these concepts inform policy in the modern enterprise regarding the protection of information stored in computing infrastructures.
Computer systems security
The security and resilience of computer systems, their vulnerability level and the exploitation opportunity they present to perpetrators.
Incident response and forensic readiness
Responding to incidents originating from the cyber-domain while adhering to digital forensic principles regarding data attributes.
Enumeration of network devices
Mapping out the logical incident scene, identifying internal and external network boundaries.
Linux security architecture
Kernel security modules and how they support ISM principles.
Windows security architecture
Windows security modules and how they support ISM principles.
Security audit
Systematic evaluation of the security of an enterprise environment by measuring how well it conforms to a set of established criteria.
Performance and practice
Perform a security audit of an information infrastructure.
Example Terms, Techniques and Technologies
CIA, Bell-LaPadula, risk and threat
Information security models for access controls as part of a defense in depth strategy. Risk and threat management of informational infra structures.
Foot printing, port scanning and enumeration of computer systems
Identifying and assessing vulnerability levels of computing devices.
Incident response and readiness, network monitoring, infrastructure auditing
Establish capability in the business environment for securely gathering legally admissible evidence, establish policy for secure storage and handling of potential evidence, ensure monitoring and auditing is targeted to detect and deter major incidents.
Advanced network security
Understanding Firewalls, IDS, IPS, Netflow, Wireshark data captures.