- Comparing Security Roles and Controls
- Explaining Threat Actors and Threat Intelligence
- Performing Security Assessments
- Identifying Social Engineering and Malware
- Summarizing Basic Cryptographic Concepts
- Implementing Public Key Infrastructure
- Implementing Authentication Controls
- Implementing Identity and Account Management Controls
- Implementing Secure Network Designs
- Implementing Network Security Appliances
- Implementing Secure Network Protocols
- Implementing Host Security Solutions
- Implementing Secure Mobile Solutions
- Summarizing Secure Application Concepts
- Implementing Secure Cloud Solutions
- Explaining Data Privacy and Protection Concepts
- Performing Incident Response
- Explaining Digital Forensics
- Summarizing Risk Management Concepts
- Implementing Cybersecurity Resilience
- Explaining Physical Security
Students should have basic Windows user skills and a fundamental understanding of computer and networking concepts. Achievement of CompTIA A+ and Network+ certifications, plus two years of experience with IT administration with a security focus.
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.
Sjoerd Hulzinga - KPN p/a Bloomville
It was quite informal.
- Capita Business Services Ltd
Trainer covered a lot of ground over a relatively short period.
- Capita Business Services Ltd
I found it very interesting to learn all about what happens behind the scenes when it comes to IT systems. I also enjoyed learning about security and what hackers do as ethical hacking is an avenue I'm very keen in pursuing.
- Knowledge Pool/ DVLA
Richard was very knowledgeable in his field.
- Knowledge Pool/ DVLA
It was pitched at the right level - challenging but understandable & informative.
Louise Voisey - Capita Business Services Ltd
Mohalmald Salim - PSO
Level of expertise from the trainer Use case examples
Pierre Maillot - Bosch
His deep knowledge of the IoT topic.
Ron's experience on how to successfully implement IoT projects and the deep technical subjects covered.
relevance of content to our I4.0 business environment
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer
Oliver Steinig - Bosch
Ron was very mindful of his audience and addressed everyone's questions. He checked his audience for clarity and was willing to spend the time to review a topic until everyone understood the topic. He gauged the audience for energy levels and suggested a break when he saw that the energy from the group was waning. This was much appreciated.
The pace of training delivery.
Ian McInally - KnowledgePool
the exercises and group discussions.
The trainer was very knowledgeable and was happy to go at the pace of the attendees. He was polite and respectful to all those in attendance. I felt I learnt a lot from the course as the trainer was very succinct in his delivery when going through the PP slides. A really good, worth while course from my personal point of view.
Julie Price - KnowledgePool
The environment was really relaxed and open so everyone could ask questions or put across points of view or experience. David the trainer was a SME on the subject and his style was very good.
The example and exercise
I got more information regarding the web applications' security issues, the different tools that could be used to cope with these issues, and more advice from the trainer to handle all these issues.
the list of tools
how it was broken into the technical and security mindset aspects.
he is very knowledgeable and comprehensive.
Matthew was very knowledge and has lot experience to share with us. it was very pleasant, as he take the time to listen to us and answer to our questions. Thank you Matthew, it was awesome.
The second day, scenarios exercises.
Christina Hutchings - KnowledgePool
The real life examples Ron gave.
I liked the trainer's introduction and anecdotes to make the learning more real
David's in depth knowledge. His relationship building skills with the audience. I really enjoyed the way he managed to make us (as a collective audience) enjoy the quite dry and uninteresing subject matter. He had anecdotes and knowledge of specific examples of security failings - hacker attacks - BCP 'breakdowns' etc which put flesh on the bones to the piece of legislation or 'best practice' for BCP that he was trying to teach us about. A really engaging, down to earth and personable man: A very good listener and a fabulous, charismatic trainer.
Cris Bollin - KnowledgePool
All is excellent
Manar Abu Talib - Dubai Electronic Security Center
- Understanding that ATT&CK creates a map that makes it easy to see, where an organization is protected and where the vulnerable areas are. Then to identify the security gaps that are most significant from a risk perspective. - Learn that each technique comes with a list of mitigations and detections that incident response teams can employ to detect and defend. - Learn about the various sources and communities for deriving Defensive Recommendations.
CHU YAN LEE - PacificLight Power Pte Ltd
He took his time to make sure everyone understood and were on the same wave length
Tina Hopkins - Capita Business Services Ltd
I found the training too in depth for IT beginners. There was too many high level subjects that i felt were too advanced for a beginner level.
Capita Business Services Ltd
Cloud Computing Security Knowledge (CCSK) Preparation Course21 hours
Cloud Computing Security Knowledge (CCSK) Preparation Course The CCSK course is intended to provide understanding of security issues and best practices over a broad range of cloud computing domains. As cloud computing is becoming the dominant IT
Certificate of Cloud Security Knowledge14 hours
Description: This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands on it with extensive hands-on labs in a second day of training. Students will learn to apply their knowledge by performing a series of
Certificate of Cloud Security Knowledge (CCSK) Foundation (CSA authorized)14 hours
The CCSK Foundation course starts with the fundamentals, then increases in complexity as it works through all 16 domains of the CSA Security Guidance, recommendations from the European Union Agency for Network & Information Security (ENISA), and
Certificate of Cloud Security Knowledge (CCSK) Plus (CSA authorized)21 hours
The CCSK Plus builds on the foundation class with expanded material and offers extensive hands-on activities that reinforce classroom instruction. Students engage in a scenario of bringing a fictional organization securely into the cloud, which
Certified Ethical Hacker35 hours
Objectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification Target Audience: This course will significantly benefit
Incident Response21 hours
Threat Hunting21 hours
C/C++ Secure Coding21 hours
This three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure
Advanced Java Security21 hours
Even experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java. The course –
Standard Java Security14 hours
Description The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only
Java and Web Application Security21 hours
Description Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are
Microsoft SDL Core14 hours
The Combined SDL core training gives an insight into secure software design, development and testing through Microsoft Secure Development Lifecycle (SDL). It provides a level 100 overview of the fundamental building blocks of SDL, followed by design
Fundamentals of Corporate Cyber Warfare14 hours
Cyber Warfare is a growing problem for enterprises. As attackers employ more and more sophisticated technologies to launch their attacks, it is vital for companies to understand the nature of these attacks and the defense mechanisms needed to keep
Open Source Intelligence (OSINT) Advanced21 hours
Open Source Intelligence (OSINT) refers to any information that can legally be gathered from free, public sources about an individual or organization. OSINT also refers to the process of collecting this data, analyzing it, and using it for
Open Source Cyber Intelligence - Introduction7 hours
This Introduction to Open Source Intelligence (OSINT) course will provide delegates with skills to become more efficient and effective at finding those key pieces of intelligence on the Internet and World Wide Web. The course is highly practical