CPO

Cyber Protection for Organizations

The program provides general introduction to the cyber security arena: threats, risks, actors, attacks, regulations, technology, and principles of engagement, serving the purpose of developing basic right conduct of behaviors and awareness, regarding cyber security in the digital era.

28 Hours

Cloud Environment

Instructor Led

Virtual Labs & Simulation

With cyber-attacks inflicting billions of dollars of damages to the global economy, we must understand how to protect ourselves and grasp the fundamentals of cyber security. By the end of the course, students will gain an introduction to cybersecurity defense concepts, methods, standards, and best practices. learn how to response to common security incidents. Get familiar with common security tools, defense-in-depth methodology, cyber kill chain, Governance, regulations, risk management, and required compliance.
WHO IS IT FOR
Current & Future
decision makers
Tech-oriented Employees
Tech & IT Teams
Security Teams
STEM Students
Business Admin Students
GOALS
Get familiar with terms, regulations, and standards
Get familiar with common procedures, concepts, and decision-making processes
Understand the Incident Response plan & methodologies
Get to know Vulnerability & Patch Management process
Get to know cyber security technologies and tools
Get familiar with Different types of attacks (Tactics & Technics)
Get to know SIEM & SOAR environments
Get to know investigations processes (Malware analysis & Digital forensics)
Understand the zero-trust concept
Requirements
• English (Option for presentation in local language + Demo and labs in English)
• General tech. Orientation – browsing the internet

• Introduction to cyber defense: case studies of ineffective strategies
• The fundamental role of education and training: human firewalls
• Cyber real life use cases simulations
• Common Cyber Security Terminologies
• Cyber Security Technologies
• The PPT Triad

  • Cyber Security Operation Center – SOC
  • SOC building Blocks
  • Internal/External communication
  • Critical assets
  • Risk assessment
  • Events VS Incidents
  • NIST Framework
  • IR Phases
  • Introduction to Cyber Attacks
  • Threat Actors
  • Threat Vectors
  • Attack Cyber Kill Chain
  • Common Terminologies
  • SIEM Concept
  • Automation & Orchestration intro
  • Get to know the TOP technologies
  • SOAR – “The good, the bad & the ugly”

• Intro to Cryptography – Common Terminologies
• Basics of Cryptography –How it works, Hash algorithms
• “Trust” in Cryptography
• Defining Cybersecurity Controls
• Endpoint Security Controls – Operating Systems
• Network Security Control – Firewalls, IDPS, Network Access Control
• Advanced control capabilities – AI\ML, context and behavior analysis

  • Final Test

5-8 Hours of hands-on activities

Total amount of practical experience during this course.

Contact Us