We position this with corporates as compliance training, and can also be added to any email training or general cyber awareness training need. Both ILT and eLearning available with compliance reporting.
Table of Content:
Assessment of Information Security Risks
Analyzing the Threat Landscape
Computing and Network Environments: Analyzing Reconnaissance Threats
Analyzing Attacks on Computing and Network Environments
Examining Post-Attack Techniques
Manage Vulnerabilities in the Organization
Evaluate Security by Implementing Penetration Testing
Collecting Cybersecurity Intelligence
Analyze Log Data
Performing Active Asset and Network Analysis
Response to Cybersecurity Incidents
Investigating Cybersecurity Incidents
Start with the customer – find out what they want and give it to them.
WE WOULD LIKE TO HEAR FROM YOU
Learn about our financing options for this programme.