CPO
Cyber Protection for Organizations
The program provides general introduction to the cyber security arena: threats, risks, actors, attacks, regulations, technology, and principles of engagement, serving the purpose of developing basic right conduct of behaviors and awareness, regarding cyber security in the digital era.
28 Hours
Cloud Environment
Instructor Led
Virtual Labs & Simulation
• Introduction to cyber defense: case studies of ineffective strategies
• The fundamental role of education and training: human firewalls
• Cyber real life use cases simulations
• Common Cyber Security Terminologies
• Cyber Security Technologies
• The PPT Triad
- Cyber Security Operation Center – SOC
- SOC building Blocks
- Internal/External communication
- Critical assets
- Risk assessment
- Events VS Incidents
- NIST Framework
- IR Phases
- Introduction to Cyber Attacks
- Threat Actors
- Threat Vectors
- Attack Cyber Kill Chain
- Common Terminologies
- SIEM Concept
- Automation & Orchestration intro
- Get to know the TOP technologies
- SOAR – “The good, the bad & the ugly”
• Intro to Cryptography – Common Terminologies
• Basics of Cryptography –How it works, Hash algorithms
• “Trust” in Cryptography
• Defining Cybersecurity Controls
• Endpoint Security Controls – Operating Systems
• Network Security Control – Firewalls, IDPS, Network Access Control
• Advanced control capabilities – AI\ML, context and behavior analysis
- Final Test
5-8 Hours of hands-on activities
Total amount of practical experience during this course.