CPO
Cyber Protection for Organizations
The program provides general introduction to the cyber security arena: threats, risks, actors, attacks, regulations, technology, and principles of engagement, serving the purpose of developing basic right conduct of behaviors and awareness, regarding cyber security in the digital era.
28 Hours
Cloud Environment
Instructor Led
Virtual Labs & Simulation

With cyber-attacks inflicting billions of dollars of damages to the global economy, we must understand how to protect ourselves and grasp the fundamentals of cyber security. By the end of the course, students will gain an introduction to cybersecurity defense concepts, methods, standards, and best practices. learn how to response to common security incidents. Get familiar with common security tools, defense-in-depth methodology, cyber kill chain, Governance, regulations, risk management, and required compliance.
WHO IS IT FOR
Current & Future
decision makers
Tech-oriented Employees
Tech & IT Teams
Security Teams
STEM Students
Business Admin Students
GOALS
Get familiar with terms, regulations, and standards
Get familiar with common procedures, concepts, and decision-making processes
Understand the Incident Response plan & methodologies
Get to know Vulnerability & Patch Management process
Get to know cyber security technologies and tools
Get familiar with Different types of attacks (Tactics & Technics)
Get to know SIEM & SOAR environments
Get to know investigations processes (Malware analysis & Digital forensics)
Understand the zero-trust concept

Requirements
• English (Option for presentation in local language + Demo and labs in English)
• General tech. Orientation – browsing the internet

- Introduction to cyber defense: case studies of ineffective strategies
- Common Cyber Security Terminologies
- Cyber Security Principles
- Cyber Security Processes
- The PPT Triad
- The fundamental role of education and training: human firewalls
- Cyber Security Technologies
- Cyber Security Operation Center
- Critical assets
- Introduction to Cyber Attacks
- Threat Actors
- Events VS Incidents
- IR Phases
- Attack Cyber Kill Chain
- Intro to Social Engineering
- Social Engineering Countermeasures and recommendations
- SIEM Concept
- SIEM Functionality and features
- SIEM TOP Technologies
- SOAR – Concept and Functionality
- Intro to Cryptography – Common Terminologies
- Basics of Cryptography –How it works, Hash algorithms
- “Trust” in Cryptography
- Defining Cybersecurity Controls
- Endpoint Security Controls – Operating Systems
- Network Security Control – Firewalls, IDPS, Network Access Control
- Advanced control capabilities – AI\ML, context and behavior analysis
- Ground-up security: devices
- Endpoint Protection
- Encryption: Data at Rest
- Ground-up security: network
- Network Security: Firewall, IDS/IPS, Threat Analysis and Admission Control, Cloud security.
- Middleware Security: Content Management, email Security, DNS Security.
- Encryption: Data in Transit, Digital Certificates
- AI based behavior analysis
- Ground-up security: data and services
- Data Loss Prevention
- Application Security and SSDLC
- Identity Management and Governance
- Disaster recovery
- Business continuity
- Security as a process: continuous improvement and monitoring tools
- The execution: key success factors in deploying defense solutions
- Zero Trust case histories
- Final Test
5-8 Hours of hands-on activities
Total amount of practical experience during this course.