Who should attend
This course is intended as a short introductory course for ICT professionals who want to understand the fundamentals and best practices in cybersecurity as well as keep abreast of the trends in the cybersecurity landscape.
About the course
Cybersecurity is the application of technologies, processes and control measures designed and implemented to protect systems, networks, computer programs, devices and data from unauthorised access and attacks.
Cyberattacks are increasingly growing in sophistication and are a critical business challenge for every organisation. As remote work and insecure data practices persist, cyber breach costs are expected to rise considerably across all industries.
Organisation and user’s assets include connected computing devices, related personnel, organisational infrastructure, applications, services, telecommunications systems and networks. It also includes transmitted and/or stored information in the cyber environment.
Cybersecurity aims to ensure the attainment and maintenance of the security properties of the organisation and user’s assets against relevant security risks in the cyber environment.
This course provides a technical overview of the top cybersecurity risks that every IT professional needs to know. This course starts with the fundamentals of risk management followed by cryptography, communications & network security and web application security related topics. It also introduces trends in mobile, cloud and Internet of Things security.
By combining lectures with discussion and hands-on workshops, the course equips the participants with skills necessary to understand the importance of various industry best practices in cybersecurity
What Will Be Covered
At the end of the 2-day course, the participants will be able to learn:-
Module 1: Fundamentals of Cryptography
- Security Concepts Essentials
- Cryptographic Techniques
- Digital Signatures
- Digital Certificates
Module 2: Introduction to Risk Management
- Threats and Attacks
- Risk Management
- Business Continuity and Planning
Module 3: Communication and Network Security
- Intrusion Detection Systems
- Administering a Secure Network
Module 4: Application Security
- Web Application attacks
- Threat modelling
- Security Assessment and Testing
- Secure Software Development
Module 5: Identity and Access Management
* Access Control Models * Module 6: Trends in Cybersecurity * Mobile Security * Cloud Security * Internet of Things Security * AI/ML Security
Sarita Singh received her Ph.D. degree for her work done in the area of Information Security (Cryptography). She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of work experience in areas including teaching and researc...
Max has more than 15 years of leadership experience in cybersecurity, technology risk management, data protection, compliance, IT governance and technological audit. He served customers across the Asia Pacific and Japan region empowered them with pragmatic and innovative resolution addressing sec...
Read more about Information Technology
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.