This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cybersecurity to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking, and black hat hacking.
It will also cover WiFi security, Website security, human factors, cyber forensics, cybersecurity team management, Secure Operations Center (SOC), and Computer Security Incident Response Team (CSIRT) infrastructures.
As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example of security incident and identify the best practices which could be applied to secure their own organization and associated assets. All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS), and forensic investigations.
By the end of the course, participants will be able to:
Apply information security standards to their organization and its critical assets.
Identify the threats presented by viruses, malware, active code, and Active Persistent Threats (APT) and consider the different mitigating options.
Formulate and manage effective cybersecurity teams, and apply the Computer Security Incident Response Team (CSIRT) framework, tools, and capabilities to deliver cost-effective and robust solutions to protect the organization.
Use Neuro-Linguistic Programing (NLP) to deliver messages that will change the way employees work and think about security.
Examine the area of wireless security protocols, their security attributes, and their potential insecurities within the organization, and in public spaces.
Illustrate how penetration testing and ethical hacking enhance organizational security.
Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence.
IT professionals
Security professionals
Auditors
Site administrators
General management and anyone tasked with managing and protecting the integrity of the network infrastructure
This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.
Information security standards (e.g. PCI-DSS/ISO27001).
Documented tools:
ISO/IEC 27001.
PAS 555.
Control Objectives for Information and Related Technology (COBIT).
Future standards:
ISO/IEC 2018.
EU privacy regulations.
Local and international government stipulations implicating access to private data.
Enterprise security:
External defenses.
Web filtering.
Intruder Prevention Systems (IPS).
Intruder Detection Systems (IDS).
Firewalls.
Secure code.
Software Development Lifecycles (SDL).
Potential insecurities within developed applications.
Because supervisory levels are the link between the executive and senior management levels, achieving the organization's objectives, increasing productivity and overall performance of the organization, affects the effectiveness and efficiency of supervisors' performance.
And because of the skills of supervisors in any organization in need of continuous development, and to acquire advanced tools and methods that reflect on the deepening of these skills and activate their role in motivating individuals working, and push them to commit to the goals of the organization.
You need this conference to learn about supervisory skills and advanced methods, to be able to play an effective and supervisory role in your organization.
Managing an office has become an increasingly sophisticated and complex job. The increased demand for speed and accuracy, knowledge of new technology, and an increasingly diverse workforce bring challenges and also opportunities for growth. This dynamic and in-depth course explores some of the more advanced skills which can help an office manager to work more confidently, creatively, and effectively.
As a supervisor, the success of your organization rests in your hands. This course provides you with the opportunity to develop highly effective and essential supervisory skills that will strengthen teamwork and organizational success. Also, this course will help you manage everyday operations with greater ease. Furthermore, it will help you leverage both your managerial and people skills to meet your new challenges as the 21st-century supervisor.
This course is designed for participants to introduce to key issues and themes in international development.
Participants will explore and engage in academic debates and discussions around a set of key factors that shape, influence, and constrain the development and prosperity of nations.
The course will explore a number of key themes in international development, including how questions of gender and generation shape the impact of poverty; how processes of globalization, migration, and violent conflict impact development; and how development and the environment are linked.
It also considers what exactly we mean by poverty, and how different ways of understanding poverty feed into different approaches to tackling it.
It will also consider development institutions: what are the key institutions in the architecture of international development? How do they differ, and what are the challenges and opportunities they present? Through this module, participants will gain a solid background in the various factors which shape current approaches to and debates on international development.
By introducing participants to a range of problems in economic development, we will look to analyze how economic theory and models can explain the lack of development in some nations. We will apply such theory to real-world economies to understand the nature of the problems they face and how effective policies can be in tackling the problems.
A five-day course on the practical aspects of piping and pipeline design, integrity, maintenance, and repair. The participants will obtain an in-depth understanding of the ASME B31 code rules and API standards, their technical basis, and practical application to field conditions.
Corporate/Public governance and risk management are critical There is increasing attention being paid to corporate governance and risk management in business schools and among legislators.