Discover how hackers exploit vulnerabilities to successfully launch their attacks
AVAILABLE ON CLIENT SITE OR AS A PUBLIC COURSE
It is essential to train and educate your team on the most relevant network threats and how hackers exploit vulnerabilities to successfully launch their attacks.
This two-day course is based on evidential information about cybersecurity attacks facing various organisations today. The course is based on our experience and interaction with our clients and other industry attack victims.
This course is delivered by a very experienced senior leader and trainer. The trainer has extensive knowledge and expertise to manage and deliver a successful workshop, and he has experience in dealing with different verticals. Collectively, CMA and its specially-selected associates have an excellent track record of delivering engagements, small and large, supporting the information security and cyber incident management subjects.
All attendees should have a basic understanding of information technology and must be able to understand the course content from a basic technology point of view.
- OODA
- Triage
- Diamond Methodology
- Logging
- SIEM
- Log Management
- Log Types
- Deception Technology
- Visibility
- Cyber Kill Chain
- Types of Attackers
- Privileges Insider
- Types of Attack Motivations
- Impact of Actions
- Attack Vectors
- Taxonomy
- Processes
- People
- Technology
- Active Directory-Based Attacks & The Privileged User
- LAN-Based Attacks
- DDoS & DoS
- DNS
- Advanced Persistent Threats
London | 12th/13th Oct |
Dubai | 14th/15th Nov |
Singapore | 22nd/23rd Jan |
London | 5th/6th Feb |
Dubai | 10th/11th March |
Bangalore | 28th/29th April |
Mumbai | 1st/2nd May |
London | 5th/6th June |
Dubai | 8th/9th July |
“I found the course to be very interesting. It not the usual bookish theoretical type, of course, it was quite interactive.."
CIO, Rak Bank, Dubai
“Amar Singh brings a wealth of personal experience and knowledge.”
President ISACA UAE
“The course was excellent. Not the typical core text book training but giving valuable insights and experiences.”
Head of IT, Bank of Sharjah, UAE
“This was the most interesting and attractive courses I have ever attended. A lot of inside knowledge was shared.”
Head of Audit, Emirate Global Aluminium, UA
"I wish all Senior Executives attend this course. It’s the most practical course I have ever attended. It teaches you not just how to understand but also how to respond to a Cyber Attack. ."
"The information we learnt provoked plenty of conversation both around personal experiences with the challenges that I face in the business and also backing up what was said in the course with real-life examples"
"The training was very informative and well knowledgable and i would recommend this course to anyone who wishes to explore cyber security even further."
IT Director, Christ the King Sixth Form Colleges London
"It’s been a great two days of learning. We drilled down, we simplified how an incident should be detected and how an incident should be handled. One of the key learnings I have taken is define normal. ."
"The overall training was good, it was quite informative. I highly recommend this training session to at least the CXO level people because it is something very meaningful for them and it can be very beneficial for organisations."
"Amar is a good mentor because he did more than just teaching. The checklist and mind maps are a really good part of the course. ."
IT Manager, HLB HAMT, Dubai UAE
"Amar is an excellent tutor and mentor also. The key aspects of the training is interactive sessions. Everyone has shared their experiences. I gained much knowledge which will be useful for my day to day activities."
"I really learnt a lot from this course as it was the first cyber security course I have been on. What I liked the most was the mind-mapping."
Paramount Computer Services, Dubai UAE
"I recommend everyone to attend this course whether your business is at the beginning or whether you have already implemented some of the IT security procedures. Even if you think you are protected but in fact it is not protected.."
Most of the networking aspects I already knew quite well, but the security concepts and in particular your anecdotes and commentary were very useful. I think you did a great job.
Wynard Group
"We have to understand what the adversery is doing in order to be able to start thinking about how the organisation should look to respond."
This course is available as internal training course delivered on client site or alternatively you can attend one of our public courses. Please fill in the form below and one of our team will get in touch to discuss your requirments.
© 2022 Cyber Management Alliance.