Discover how how hackers exploit vulnerabilities to successfully launch their attacks
It is essential to train & educate your team on the most relevant network threats and how hackers exploit vulnerabilities to successfully launch their attacks.
This two day course is based on evidential information about cyber security attacks facing various organisations today. This course is based on our experience and interaction with our clients and other industry attack victims.
This course is delivered by a heavily experienced senior leader and trainer. The trainer has extensive knowledge and expertise to manage and deliver a successful workshop and he has experience in dealing with different verticals. Collectively, CMA and its specially selected associates have an excellent track record of delivering engagements, small and large, supporting the Information Security and cyber incident management subjects.
All attendees should have basic understanding of information technology and must be able to understand the course content from a basic technology point of view.
- Diamond Methodology
- Log Management
- Log Types
- Deception Technology
- Cyber Kill Chain
- Types of Attackers
- Privileges Insider
- Types of Attack motivations
- Impact of Actions
- Attack Vectors
- Active Directory based attacks & the Privileged User
- LAN Based Attacks
- DDoS & DoS
- Advanced Persistent Threats
"We have to understand what the adversery is doing in order to be able to start thinking about how the organisation should look to respond."
This course is available as internal training course delivered on client site or alternatively you can attend one of our public courses. Please fill in the form below and one of our team will get in touch to discuss your requirments.