A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).
This 5 day course teaches the attendees a wealth of hacking techniques to compromise the security of various operating systems, networking devices and web application components.
For IT security professionals, staying up-to-date with the latest vulnerabilities and exploits is a real challenge. Knowing a vulnerability from a high level perspective is not enough. A good security professional must be able to demonstrate the impact of the vulnerability.
Cyber Resilience RESILIA from Axelos is the Cyber best practice, designed to help commercial and government organisations prevent, detect and address the impact that cyber-attacks have on the information required to do business. The Cyber Resilience RESILIA Foundation course starts with the purpose, key terms, the distinction between resilience and security.
The World Wide Web and the Internet are fantastic places to converse, conduct business, do research, or simply relax and play a few games. But unfortunately, it's also a place where some individuals would like to create havoc by committing fraud, identity theft, robbery, or to commit more serious crimes such as terrorism.
This 1 day course is intended for managers and leaders of organisations and businesses of any description and size. It is an introduction to Cyber Security and describes what it is, the terminology that is used, and the way that it affects all businesses and why managers need to understand more about it so that they can manage it more effectively.
This 5 day course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents.
This course provides delegates with Advanced knowledge in understanding the difference between the Dark and the Deep Web. The Deep Web is any portion of the Internet that cannot be accessed by traditional search engines like Google, Bing and Yahoo, which is about 95% of the Internet. You will learn how to navigate and locate information on the Deep Web.
With the increase in cyber-attacks on business, it's time to start building security into new systems developments right from the start. The majority of successful cyber-attacks depend on exploiting a few well-known common vulnerabilities.
Introduction to digital forensics is designed to help commercial and government organisations collect, preserve and report on digital artefacts in a way which is suitable for use in investigations.
The objective of the course is to provide a comprehensive but necessarily high level overview across industry standard technology and platforms, illuminating the technology and its specific cyber governance, risk and assurance challenges without technically challenging the learner to hands-on labs.
The course spans cloud security principles, patterns and architectural frameworks, data protection and compliance for cloud based applications, data and infrastructure, and the design, development and implementation of cloud security architectures.