jumeirah messilah beach hotel & spa kuwait ... - gccia
TRANSCRIPT
CYBERSECURITYTRAINING
Challenges of Designing a Secure System
Cybersecurity Foundation
GULF COOPERATION COUNCIL INTERCONNECTION AUTHORITY
2731 January 2019
course fee: USD 2,000 per participant
For more details please contact: Rabee Al-Maqabi, ICC System Section Head GCCIA, [email protected] , Fax +966 013 821-1766 Tel: +966 013 821-4360
"The reality in today’s connected world is that there
can be no absolute security. However, having
knowledge on the potential risk will help an
organization mitigate and manage these risks and
protect the system against unathorized access."
GCCIAICCS, GCCCIGRE 2017
Jumeirah Messilah Beach Hotel & Spa Kuwait
COURSE OVERVIEW & OBJECTIVES
OBJECTIVES
After this course, participants will gain indepth
understanding about cybersecurity and the
importance of having a secure infrastructure.
Moreover, participants will have a better
understanding on the following;
Current cyber threats and cybersecurity site
references.
How Security zones and detailed logging
augment information assurance.
Governmentmandated directives and
compliance requirements.
Forensic challenges and incident response
planning.
Cyber roles required to successfully design a
secure system.
Risk management process.
The attack cycle perpetrated by malicious
hackers.
Goals achievable with auditing, scanning,
and testing systems.
Enterprise policy requirements.
Industry recommendations for maintaining
secure access control.
Best strategies for securing the enterprise
with layered defenses.
Standardsbased cryptographic solution for
securing communications.
COURSE OVERVIEW
In this cybersecurity course, participants will
gain a global perspective of the challenges of
designing a secure system, touching on all the
cyber roles needed to provide a cohesive
security solution.
Through lecture, labs, and breakout discussion
groups, participants will learn about current
threat trends across the Internet and their
impact on organizational security.
Participants will review standard cybersecurity
terminology and compliance requirements,
examine sample exploits, and gain handson
experience mitigating controls. In a contained
lab environment, participants will work with
live viruses, including botnets, worms, and
Trojans. In addition to technical cybersecurity
components, participants will learn and explore
the nontechnical aspects of cybersecurity
necessary to mitigate risk and lessen
exposure, including risk management, threat
determination, disaster recovery, security
policy management, and business continuity
planning. This course provides an excellent
foundation for those proceeding to CISSP,
CEH, CISA, or CISM training.
Challenges of Designing a Secure System
Cybersecurity FoundationJumeirah Messilah Beach Hotel & Spa Kuwait, 2731 January 2019
COURSE CONTENT /SCHEDULE
Cybersecurity Awareness
Data Security and Architecture
Identity Management, Malware & Social Engineering
Software & Physical Security
Incident Response & Trends
27 January 2019 Module 1: Cybersecurity AwarenessModule 2: Network DiscoveryModule 3: Systems Hardening
28 January 2019
Module 4: Security ArchitectureModule 5: Data SecurityModule 6: Public Key Infrastructure
29 January 2019 Module 7: Identity ManagementModule 8: Network HardeningModule 9: Malware Module 10: Social Engineering
30 January 2019
Module 11: Software SecurityModule 12: Environment MonitoringModule 13: Physical Security
31 January 2019
Module 14: Incident ResponseModule 15: Legal ConsiderationsModule 16: Trends in Cybersecurity
DAY 1
DAY 2
Challenges of Designing a Secure System
Cybersecurity Foundation
DAY 3
DAY 4
DAY 5
Jumeirah Messilah Beach Hotel & Spa Kuwait, 2731 January 2019
About the Trainor
Challenges of Designing a Secure System
Cybersecurity FoundationJumeirah Messilah Beach Hotel & Spa Kuwait, 2731 January 2019
ENG. AHMED AMIN Cybersecurity Product Manager MEA,
Global Knowledge
Ahmed’s specialty is network/application penetrationtesting and vulnerability assessments. Many of hiscustomers span large financial institutions, which hasafforded opportunity to perform BITS certification testingfor financial applications. In addition, Ahmed hasexperience assessing, designing, and managing highlyavailable Firewall, VPN, and IDS solutions. He hasperformed administration and extensive securityassessments across multiple platforms, as well asperformed security policy and technical standardsdevelopment targeting UNIX, Windows and Cisco IOShardening and auditing. Ahmed has also performedbusiness continuity/disaster recovery planning indatacenter environments.
Ahmed is a certified instructor with unique ability ofdelivering the information using his extensive securityexperience and his Master of Cybersecurity from ECCouncil University, USA. (2015 – 2017) and ability todeliver the below wide range of security training
Information Security Related Courses:
CEH v.8 – (Certified Ethical Hacking) ExaminationPreparation Course CHFI – Certified Hacking Forensic Investigator ECSA/LPT – ECCouncil Certified SecurityAnalyst/Licensed Penetration Tester CompTIA Security+ Course CISSP Certified Information System SecurityProfessional. ENSA – ECCouncil Network Security Administrator CISA – Certified Information Systems Auditor
Delivery in MEA
Customer deliveries include; UAEAir force UAE Navy Oman MOD UAE MOD KSA National GuardHealth Affairs KSA MilitarySurvey Departments – UAE Police The average MTM evaluation scoreis 4.71/5 over 2017 and 2018