Executive Cyber Security Awareness Training Course
This program offers leaders and managers a comprehensive overview of the key issues and activities within the cybersecurity landscape.
Executives will gain insights across various topics to strengthen their knowledge base and refine executive decision-making capabilities concerning cyber threats.
Upon completion of this training, participants will be able to:
- Comprehend internet privacy and social network security
- Understand PII (Personally Identifiable Information) and its significance
- Learn methods for securing online assets
- Protect the privacy of business users
- Gain familiarity with cyber laws that safeguard privacy
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical sessions.
- Hands-on implementation within a live-lab environment.
Customization Options
- For customized training arrangements, please contact us.
Course Outline
Introduction
Threat Actors and Their Motivations
- Cybercriminals
- Script kiddies
- State-sponsored hackers
- Hacktivists
- Insiders
- Researchers / white hat hackers
Types of Cyber Attacks
- Ransomware
- DDoS
- APT
Tactics and Techniques
- Phishing, vishing, and smishing
- Malicious devices
- Physical security
- Brute force and password spraying
- APT attacks
Cyber Resilience Strategy
- MITRE ATT&CK
- Defense in depth
- Security monitoring
- Disaster recovery
Personal Security
- Password security and multifactor authentication
- Darknet monitoring
- Secure internet connections
- Data encryption
- Secure email practices
- Mobile security
Summary and Next Steps
Requirements
Basic computer proficiency
Fundamental knowledge of internet and email usage
Open Training Courses require 5+ participants.
Executive Cyber Security Awareness Training Course - Booking
Executive Cyber Security Awareness Training Course - Enquiry
Executive Cyber Security Awareness - Consultancy Enquiry
Testimonials (1)
I enjoyed refreshing my knowledge on the various subjects on cyber security. I was increasingly interested around cyber attacks, how they happen and what we (as an organisation) could potentially do to try and mitigate any risks. I did raise a question around AI in cyber attacks, and the answer was very in depth and interesting with a live example given on the spot.
Siobhan
Course - Executive Cyber Security Awareness
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for system administrators who want to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for improved performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
ABAP Secure code
14 HoursUpon completion of this training, participants will be able to:
- Explain the principles of application security and common vulnerabilities
- Outline ABAP programming best practices and the proper handling of SY-SUBRC
- Understand the nature of injection vulnerabilities
- Describe available security testing tools
- Explain the functions of ATC and CVA
Course Format
- Interactive lectures and group discussions.
- Extensive exercises and practical activities.
- Hands-on implementation within a live-lab environment.
Active Directory for Admins
21 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for system administrators seeking to use Microsoft Active Directory for managing and securing data access.
Upon completion of this training, participants will be capable of:
- Deploying and configuring Active Directory.
- Establishing a domain and defining access rights for users and devices.
- Managing users and machines via Group Policies.
- Controlling access to file servers.
- Setting up a Certificate Service and handling certificates.
- Implementing and managing services such as encryption, certificates, and authentication.
Applications Security Foundation
21 HoursThis course addresses the fundamental topics of secure coding that are critical for a wide range of web application developers. Participants will learn the core principles of secure programming by examining specific code snippets, identifying potential security vulnerabilities, and applying effective remediation strategies.
Throughout the course, you will observe demonstrations of real-world attacks and learn how to defend against them, building your confidence as you strive to enhance the security of your applications.
Duration: 3 days
Target Audience: Developers seeking to expand their expertise in secure coding practices.
Learning Outcomes
• Participants will acquire knowledge in:
• Web Application Security.
• Common Web Application Risks.
• Demo Web Application Penetration Testing.
• Data Validation.
• Authentication.
• Session Management.
• Secure SDLC.
Android Security
14 HoursAndroid is an open-source platform designed for mobile devices, including smartphones and tablets. While it offers a wide range of security features to simplify the development of secure software, it lacks certain security mechanisms found in other mobile platforms. This course provides a comprehensive overview of these features, highlighting critical shortcomings related to the underlying Linux kernel, the file system, and the general environment, as well as the use of permissions and other Android development components.
Common security pitfalls and vulnerabilities affecting both native code and Java applications are examined, along with recommendations and best practices to prevent and mitigate them. Many of the discussed issues are illustrated with real-world examples and case studies. Additionally, the course offers a brief overview of how to utilize security testing tools to identify potential security-related programming errors.
Participants attending this course will
- Gain a solid understanding of fundamental security concepts, IT security, and secure coding principles
- Explore the security solutions available on the Android platform
- Learn how to effectively utilize various security features provided by Android
- Discover information about recent Java vulnerabilities on Android
- Identify common coding mistakes and learn how to avoid them
- Understand vulnerabilities associated with native code on Android
- Recognize the severe consequences of improper buffer handling in native code
- Comprehend architectural protection techniques and their potential weaknesses
- Access resources and further reading materials on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have previously utilized various cryptographic building blocks (such as encryption and digital signatures). To help participants grasp the role and application of these cryptographic primitives, the course first establishes a solid foundation on the core requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification, and anonymity. It also highlights typical issues that can compromise these requirements and presents real-world solutions.
Given that cryptography is a critical aspect of network security, the course discusses essential cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Instead of delving into an in-depth mathematical background, these elements are examined from a developer's perspective, illustrating typical use-case examples and practical considerations related to crypto usage, such as public key infrastructures. The course introduces security protocols across various areas of secure communication, with an in-depth discussion on the most widely used protocol families, such as IPSEC and SSL/TLS.
Typical crypto vulnerabilities are examined, both concerning specific crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and others, as well as the RSA timing attack. For each issue, practical considerations and potential consequences are described, again without going into deep mathematical details.
Finally, as XML technology is central to data exchange in networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Acquire a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursSpanning three days, this course introduces the fundamental principles of writing secure C and C++ code. It focuses on defending against malicious users who may exploit vulnerabilities related to memory management and input handling.
Advanced Java Security
21 HoursEven seasoned Java developers often lack comprehensive mastery of the full range of security services provided by Java, as well as the various vulnerabilities that impact web applications built with Java.
In addition to introducing the security components of the Standard Java Edition, this course addresses security challenges within the Java Enterprise Edition (JEE) and web services. The discussion of specific services is grounded in the fundamentals of cryptography and secure communication. Through a series of exercises, participants explore declarative and programmatic security techniques in JEE, while also examining transport-layer and end-to-end security for web services. The practical application of these components is demonstrated through hands-on exercises, allowing participants to experiment directly with the discussed APIs and tools.
The course also covers and explains the most common and critical programming flaws in the Java language and platform, as well as web-related vulnerabilities. Beyond typical errors made by Java developers, the security vulnerabilities addressed include both language-specific issues and problems arising from the runtime environment. All vulnerabilities and associated attacks are illustrated through accessible exercises, followed by recommended coding guidelines and potential mitigation strategies.
Participants attending this course will
- Gain an understanding of the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and discover how to prevent them
- Understand the security concepts underlying web services
- Acquire the skills to utilize various security features within the Java development environment
- Develop a practical understanding of cryptography
- Comprehend the security solutions offered by Java EE
- Learn about typical coding mistakes and how to avoid them
- Receive information regarding recent vulnerabilities in the Java framework
- Gain practical knowledge in using security testing tools
- Access resources and further readings on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led live training in Slovakia (online or onsite) is designed for system administrators who wish to use FreeIPA to centralize authentication, authorization, and account information for their organization's users, groups, and machines.
Upon completion of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single centralized location.
- Leverage FreeIPA's CLI, Web UI, and RPC interface to establish and manage permissions.
- Enable Single Sign-On authentication across all systems, services, and applications.
- Integrate FreeIPA with Windows Active Directory.
- Back up, replicate, and migrate a FreeIPA server.
Blockchain: Hyperledger Indy for Identity Management
14 HoursIn this instructor-led live training in Slovakia (online or onsite), participants will learn how to create an Indy-based decentralized identity system.
By the end of this training, participants will be able to:
- Create and manage decentralized, self-sovereign identities using distributed ledgers.
- Enable interoperability of digital identities across domains, applications, and silos.
- Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, etc.
- Use Indy to enable identity owners to independently control their personal data and relationships.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led live training in Slovakia (online or onsite) is designed for system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Configure the necessary server environment to start setting up authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is designed for system administrators who want to use OpenDJ to manage their organization's user credentials in a production environment.
Upon completion of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server by monitoring, troubleshooting, and optimizing performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.