This course will give attendees the necessary skills to identify the type of attack, to find out an intruder’s footprints, to properly collect evidence to prosecute and to conduct deep analysis of computer information during an expertise in Windows-based computers. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this course is for you.
This course will provide you with clear understanding of the risk of Cyber Security and the measurement skills and tools to enable making the right investment. The course will cover:
Digital Shadows will explain how organizations can adopt an intelligence-led approach to cyber security to improve their resilience and ability to withstand cyber attacks. This workshop will focus on how companies can collect, analyze, understand and action cyber threat intelligence to better understand the threats they face and how to mitigate them. The workshop will cover how attendees can help their organizations use such an approach to improve their overall information security posture and protect their critical information assets. Case studies of Digital Shadows’ work with threat-led penetration testing schemes in the UK and elsewhere will be featured and examples of how Digital Shadows have helped clients to use cyber threat intelligence to help them to secure their digital footprints.
Cyber security is one of the topmost topics due to the continuous hacks, data thefts, and high profile breaches taking place. Cyber defence thus requires a holistic security approach that includes comprehensive process and technology strategies, to be better prepared and to decrease the probability of targeted breaches, future and potential threats. This training session will elaborate on how to identify ongoing security threats and take precautions against future dangers.
Simulations are the best means of learning by experiencing it. This simulation exercise will enable you to prepare a defined and managed approach when responding to a breach or attack on an information asset. Furthermore, this training shares some of the most advanced ways of preparing for and responding to cyber attacks. This simulation exercise empowers customers to think ahead, take control of their security infrastructure, and predicatively prevent IT security threats. This simulation exercise forces top managers to identify their organisation’s most important data assets for the first time, as well as consider the potential risks to those assets of cyber attack. Participants learn through role-play.
This training aims to enhance the overall awareness of Cyber Security. You will be able to learn the methodologies and approaches to:
According to a recent research, 74% of companies have faced a DNS attack during the last 12 month.
Hackers are using more and more DNS as a vector of attack and lately a brazilian bank had been hacked.
The aim of the workshop is to show how important is a DNS to a company and how the hackers are using it to attack companies.
By the end of this workshop, attendees will understand how a DNS is working and how to protect it.