Select Page
Understanding Network Security and Defence

Understanding Network Security and Defence

About The

Understanding Network Security and Defence

The Workshop is intended to help participants to understand defensive security. It is built on the concept of “The best defense is a good offense”. Network security professionals need to look beyond the configuration of the hardware and start looking at the big picture of how data leak is carried out on the network and how it can be prevented through defensive security. In the workshop you will learn the following:

  • How to use threat hunting & OSINT activities to help you understand the threats faced by your organization.
  • Using a case study from Netflix this workshop will take you through defending security by looking at Chaos Engineering, a concept used by Netflix to build confidence in system capabilities and security.
  • Learn how to use the MITRE ATT&CK framework to track defensive security controls, identify detection capabilities, or lack thereof.
  • Learn about available open-source projects, like Red Canarys Atomic Red Team, to help you test security controls that align with specific ATT&CK techniques.
  • Understand security orchestration, automation, and response (SOAR) solutions to automate the testing of your security controls and get a clear view of what you can detect versus what you cannot.
  • Learn how SOAR can help organizations automate the testing of security controls.

 

Who Should Attend

This workshop will benefit IT Security Professionals, Experts & Consultants who are interested in Blue, Red & Purple Teaming. Those in DevOps and DevSecOps. Penetration testers & Security Engineers. Windows and Linux Experts & Administrators, and Network & Web Application Firewall Administrators.

Let us know if you want to speak at one of our Cybersecurity Friday Event!

We are constantly looking for good speakers that can provide insights in cybersecurity topics that would benefit the community. If you are such a person please contact us for a conversation.

Sponsor A Cybersecurity

Friday Event.

13 + 2 =

The Zero Trust Security (ZTS) Workshop

The Zero Trust Security (ZTS) Workshop

About The Zero Trust Security (ZTS) workshop

The Zero Trust Security workshop is design to provide a strong introduction of Zero Trust Security to the participants. It is about the new way of a holistic focus on security. The participants will learn about the fundamentals of Zero Trust Security and why it is better than perimeter security in defending the organisation against the effect of phishing, ransomware, and other modern form of cyber-attack. During the workshop you will learn the following:

  • Introduction based on a real-life case study to Zero Trust Security (ZTS)
  • Zero Trust vs traditional perimeter security?
  • Why do we need Zero Trust Security?
  • Components of Zero Trust Security
  • Understand the true meaning of the Zero Trust security framework.
  • Determine how to apply security best practices represented in the latest Zero Trust framework to your organization.
  • Understand how to assess your existing security capabilities and map out a plan for improving your organization’s security practice.
  • Understand security best practices for all areas of your business (cloud, endpoint, and network)
  • A look at a vendor perspective of Zero Trust Security Model
  • Get a quick look at Zero Trust Security in the Cloud using

At the end of this workshop participants will understand what Zero Security is and get more resources to learn and research about it further.

Who Should Attend

The workshop is designed for system, network and cloud professionals who would like to know more about Zero Trust Security. This includes but not limited to Network Architects, Network professionals, Cloud Engineers, Software Developers and Systems administrators, and Cybersecurity/ Information Security professionals.

The Zero Trust Security (ZTS) Workshop

Understanding Zero Trust Security (ZTS)

Understanding Zero Trust Security (ZTS)

TRAINING

Understanding Zero Trust Security (ZTS)

DATE

TBD

TRAINING TYPE

Virtual

ENROLL BELOW

All training runs from 9:00 to 16:30 every day.

About the Zero Trust Security (ZTS) Course

This 2-day intense course focuses on this new way of thinking about network security. Learn about the fundamentals of Zero Trust Security and how to start with its implementation in your company. During the training you will learn the following:

  • Introduction to Zero Trust Security
  • Zero Trust vs traditional perimeter security?
  • Why do we need Zero Trust Security?
  • Why is the Zero Trust Model Important?
  • Understanding micro Segmentation
  • Implementing a perimeterless Design
  • Identity management for Zero Trust Security
  • The Pillars of Zero Trust Security
  • Device Trust
  • User Trust
  • The five steps to a Zero Trust network
  • How to architect a Zero Trust network
  • A look at some vendor implementation of Zero Trust Security Model
  • Zero Trust Security in the Cloud using  Cloud Access Security Broker (CASB)

At the end of this course all participants will understand what Zero Security is and able to determine if it will be useful for their company and how to get started with it.

Target Audience

This training course is intended for professionals who would like to keep up to date with the new technology and apply them in real life environment.

  • CISO’s
  • Security Risk Managers
  • Security Engineers
  • Information Security Managers.
  • Information Security Directors.
  • All other security professionals who want to be kept up to date.

 

Understanding Data Loss Prevention (DLP)

Understanding Data Loss Prevention (DLP)

Understanding Data Loss Prevention (DLP)

All training runs from 9:00 to 16:30 every day.

About the Data Loss Prevention (DLP) Course

Data Loss is one of the biggest security challenges faced by companies today. This pose significant risks to the organization in terms of compliance to regulations, financial and reputational risk that can result from a breach of confidential data. Organization needs to find ways to protect their data and keep the customer’s data secure through. Data Loss Prevention (DLP) systems is one of the method used for this. It helps organizations to identify, monitor, and protect data in use and in transit.

The workshop will focus on the following topics:

  • Overview of data prevention.
  • The need for data loss prevention.
  • The risk of Data Loss to the organization.
  • A look at leading data loss prevention systems.
  • Understand and learn to implement Data Loss Prevention Solutions to meet the data protection needs.
  • Implement DLP systems with Security Information and Events Management (SIEM) systems.

The Online Classroom includes:

  • Access to recordings and course content for 360 days.
  • Interactive flash cards to reinforce learning
  • Independent reading and learning activities
  • Case studies and real-world scenarios
  • Knowledge checks after each domain
  • Post-course assessment questions to gauge exam readiness

Target Audience

This training course is intended for professionals who would like to keep up to date with the new technology and apply them in real life environment.

  • CISO’s
  • Security Risk Managers
  • Security Engineers
  • Information Security Managers.
  • Information Security Directors.
  • All other security professionals who want to be kept up to date.

 

Security Workshops

Our Security WorkShops

 

Understanding Network Security and Defence

Understanding Network Security and Defence

About The Understanding Network Security and DefenceThe Workshop is intended to help participants to understand defensive security. It is built on the concept of “The best defense is a good offense”. Network security professionals need to look beyond the configuration...

read more
The Zero Trust Security (ZTS) Workshop

The Zero Trust Security (ZTS) Workshop

About The Zero Trust Security (ZTS) workshopThe Zero Trust Security workshop is design to provide a strong introduction of Zero Trust Security to the participants. It is about the new way of a holistic focus on security. The participants will learn about the...

read more
Threat Modeling In Software Development Life Cycle (SDLC)

Threat Modeling In Software Development Life Cycle (SDLC)

In this workshop, our expert will take you through the process of Threat modeling. You will learn about the main idea behind threat modeling, and how to bring security and software development together in the Software Development Life Cycle. Learn to collaborate on...

read more
Understanding Data Loss Prevention (DLP)

Understanding Data Loss Prevention (DLP)

AboutUnderstanding Data Loss Prevention (DLP)Data Loss is one of the biggest security challenges faced by companies today. This pose significant risks to the organization in terms of compliance to regulations, financial and reputational risk that can result from a...

read more
Cloud Security Workshop

Cloud Security Workshop

About The Practical To Cloud SecurityCloud computing is a very hot topic today. Most companies are already using the cloud or are planning to move a part or their full operations to the cloud. With this there comes serious responsibilities in the area of security and...

read more

Understanding Data Loss Prevention (DLP)

Understanding Data Loss Prevention (DLP)

About
Understanding Data Loss Prevention (DLP)

Data Loss is one of the biggest security challenges faced by companies today. This pose significant risks to the organization in terms of compliance to regulations, financial and reputational risk that can result from a breach of confidential data.   Organization needs to find ways to protect their data and keep customer’s data secure through.  Data Loss Prevention (DLP) systems is one of the method used for this. It helps organizations to identify, monitor, and protect data in use and in transit.

The workshop will focus on the following topics:

Overview of data prevention.

The need for data loss prevention.
The risk of Data Loss to the organization.
A look at leading data loss prevention systems.
Understand and learn to implement Data Loss Prevention Solutions to meet the data protection needs.
Implement DLP systems with Security Information and Events Management (SIEM) systems.
How to combine it with User Entity Behavioural Analyses (UEBA).
Understand the Security Orchestration and Automation (SOAR) solutions.

Who Should Attend
CISO’s
Security Risk Managers
Security Engineers
Information Security Managers.
Information Security Directors.
All other security professionals who want to be kept up to date.

Let us know if you want to speak at one of our Cybersecurity Friday Event!

We are constantly looking for good speakers that can provide insights in cybersecurity topics that would benefit the community. If you are such a person please contact us for a conversation.

Sponsor A Cybersecurity Event.

3 + 6 =