TMCnet News

Cyber Security Threats, Assessment & Management Course - Bandar Seri Begawan, Brunei - August 17-18-19, 2016 - Research and Markets
[July 27, 2016]

Cyber Security Threats, Assessment & Management Course - Bandar Seri Begawan, Brunei - August 17-18-19, 2016 - Research and Markets


Research and Markets has announced the addition of the "Cyber Security Threats, Assessment & Management" conference to their offering.

First in Asia! This unique course brings together an understanding of general cyber threats but also investigatory and defensive capabilities, with practical elements it's about finding data and exploiting it to break into companies - what attackers can do and what defenders should do.

An exciting and informative course, delivered by a world-renowned expert. This course presents a counter-point to the more formal and rigid ISO approach to cyber security. The course is not about firewalls and industry standards - it is about how attackers effectively target and hack organisations without being stopped by expensive technical defences, and without financial backing. The key to almost every effective cyber attack is exploiting the human workforce. As such, the course concentrates on information security and the power of visible data, rather than the traditional focus on IT security.

The course simultaneously proides candidates with the investigative capabilities to probe the data vulnerabilities in their own staff, corporations and networks - though no technical knowledge is assumed. It is delivered by a former UK intelligence officer who specialises in tracking targets and organisations with open source tools.



Key Highlights

- Scene setters - case studies in small and large attacks.


- Attacking the human firewall - why human phishing beats any defensive tech.

- Phishing - anatomy of an attack. Recent examples to analyse.

- Search engines - advanced use in obtaining sensitive corporate data. With practical. (lab)

- Social media - advanced use in obtaining hidden personal data. With practical. (lab)

- Metadata extraction. Getting hold of corporate documents and deriving exploitable info. (lab)

- Covert activity - concealing your online digital footprint from adversaries. With practical (lab)

- Wi-fi exploitation. Understanding the tracking threat. With practical (lab)

- Penetration testing - anatomy of a security audit. In-house and outsourcing.

- Discussions (throughout) - approaches in defending an organisation.

Designed For

- CISO

- Security Director

- Cyber Security Manager / Officer

- Security Analyst / Engineer

- SOC Analyst

- Cyber Threat Analyst

- CERT Member

- System / IT Administrator

- Security Administrator

- Security Architect / Engineer

- Compliance Officer / Auditor

- Developer

- Auditor

- Compliance Officer

For more information visit http://www.researchandmarkets.com/research/mj3fff/cyber_security.


[ Back To TMCnet.com's Homepage ]