Information Technology Courses

  • latest blog post
    CLOUD MANAGEMENT & SECURITY PRINCIPLES & BEST PRACTICES

    Why Attend
    Cloud computing is a new concept using old technologies. It
    has quickly become a vital tool in organizations across all
    industries as an Internet-scale computing infrastructure.
    Nevertheless, despite Cloud computing’s increasing relevance
    and popularity, there is a lack of understanding of the security
    risks associated with Clouds and optimal approaches for
    migration into Clouds. This course covers these from a practical
    angle; specifically, it covers Cloud computing architecture,
    management services, and security challenges. It also discusses
    Cloud migration planning and the main requirements to move
    current Cloud untrusted infrastructure to a trustworthy
    Internet-scale Cloud critical computing infrastructure.
    Target Audience
    IT and infrastructure leaders, decision makers (CxO), risk analysts,
    strategic planners, architects, administrators, software and
    business developers, and project managers
    Target Competencies
    Cloud management
    Identity management
    Access management
    Security risks management
    Course Methodology
    This course is highly interactive and includes group discussions,
    case studies and syndicate work. It also includes practical
    exercises that allow all participants to use the knowledge they
    gained to demonstrate their skills in cloud management and
    security.
    Course Objectives
    By the end of the course, participants will be able to:
    Understand cloud strengths and misconceptions, and discuss
    its benefits and weaknesses
    Explain cloud structure, properties and management services
    Set a cloud adoption strategy
    Discuss the main requirements to move current cloud
    untrusted infrastructure to a trustworthy internet-scale cloud
    critical computing infrastructure
    Analyze the major risks associated with the different cloud
    services and deployment models
    Discuss the main principles, mechanisms and best practices
    for treating cloud risks
    Demonstrate the discussed concepts using practical case
    studies, business models and industrial tools

  • latest blog post
    CLOUD MANAGEMENT & SECURITY PRINCIPLES & BEST PRACTICES

    Why Attend
    Cloud computing is a new concept using old technologies. It
    has quickly become a vital tool in organizations across all
    industries as an Internet-scale computing infrastructure.
    Nevertheless, despite Cloud computing’s increasing relevance
    and popularity, there is a lack of understanding of the security
    risks associated with Clouds and optimal approaches for
    migration into Clouds. This course covers these from a practical
    angle; specifically, it covers Cloud computing architecture,
    management services, and security challenges. It also discusses
    Cloud migration planning and the main requirements to move
    current Cloud untrusted infrastructure to a trustworthy
    Internet-scale Cloud critical computing infrastructure.
    Target Audience
    IT and infrastructure leaders, decision makers (CxO), risk analysts,
    strategic planners, architects, administrators, software and
    business developers, and project managers
    Target Competencies
    Cloud management
    Identity management
    Access management
    Security risks management
    Course Methodology
    This course is highly interactive and includes group discussions,
    case studies and syndicate work. It also includes practical
    exercises that allow all participants to use the knowledge they
    gained to demonstrate their skills in cloud management and
    security.
    Course Objectives
    By the end of the course, participants will be able to:
    Understand cloud strengths and misconceptions, and discuss
    its benefits and weaknesses
    Explain cloud structure, properties and management services
    Set a cloud adoption strategy
    Discuss the main requirements to move current cloud
    untrusted infrastructure to a trustworthy internet-scale cloud
    critical computing infrastructure
    Analyze the major risks associated with the different cloud
    services and deployment models
    Discuss the main principles, mechanisms and best practices
    for treating cloud risks
    Demonstrate the discussed concepts using practical case
    studies, business models and industrial tools

  • latest blog post
    INFORMATION SECURITY MANAGEMENT BEST PRACTICES

    Why Attend
    This course will provide participants with in-depth knowledge and practical skills to
    plan, deliver and monitor IT/cyber security to internal and external clients
    encompassing a complete, conjoined set of disciplines in the areas of IT policies,
    Security-Operational-Run-Book, security/penetration testing, ethical hacking and
    Back Hat hacking.
    It will also cover WiFi security, Website security, human factors, cyber forensic and
    CSIRT infrastructures.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure their own organization, and associated assets.
    Target Audience
    IT professionals, security professionals, auditors, site administrators, general
    management and anyone tasked with managing and protecting the integrity of the
    network infrastructure. This also includes anyone already familiar and involved with
    IT/cyber/digital security and seeking to build on their fundamental principles of
    security.
    Target Competencies
    Information security management
    Vulnerability assessment and
    management
    Cyber security solutions
    IT policies and procedures
    Cyber forensics
    Ethical hacking and Black Hat
    hacking
    Course Methodology
    The course will include practical sessions, videos as well as live examples [e.g. Virus]
    and a demonstrations of White and Black Hat Hacking tools. All participants will also
    be provided with the latest research papers and articles.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure the organization, and associated assets.
    Course Objectives
    By the end of the course, participants will be able to:
    Apply information security standards to their organization and its critical assets
    Identify the threats presented by viruses, malware, active code, and Active
    Persistent Threats (APT) and consider the different mitigating options
    Apply the Computer Security Incident Response Team (CSIRT) framework, tools
    and capabilities to deliver cost effective and robust solutions to protect the
    organization
    Use Neuro Linguistic Programing (NLP) to deliver messages that will change the
    way employees work and think about security
    Study the area of wireless security protocols, their security attributes, and their
    potential insecurities within the organization, and in public spaces
    Illustrate how penetration testing and ethical hacking enhance organizational
    security
    Explore and apply two of the most important aspects in the modern day of
    cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

  • latest blog post
    INFORMATION SECURITY MANAGEMENT BEST PRACTICES

    Why Attend
    This course will provide participants with in-depth knowledge and practical skills to
    plan, deliver and monitor IT/cyber security to internal and external clients
    encompassing a complete, conjoined set of disciplines in the areas of IT policies,
    Security-Operational-Run-Book, security/penetration testing, ethical hacking and
    Back Hat hacking.
    It will also cover WiFi security, Website security, human factors, cyber forensic and
    CSIRT infrastructures.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure their own organization, and associated assets.
    Target Audience
    IT professionals, security professionals, auditors, site administrators, general
    management and anyone tasked with managing and protecting the integrity of the
    network infrastructure. This also includes anyone already familiar and involved with
    IT/cyber/digital security and seeking to build on their fundamental principles of
    security.
    Target Competencies
    Information security management
    Vulnerability assessment and
    management
    Cyber security solutions
    IT policies and procedures
    Cyber forensics
    Ethical hacking and Black Hat
    hacking
    Course Methodology
    The course will include practical sessions, videos as well as live examples [e.g. Virus]
    and a demonstrations of White and Black Hat Hacking tools. All participants will also
    be provided with the latest research papers and articles.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure the organization, and associated assets.
    Course Objectives
    By the end of the course, participants will be able to:
    Apply information security standards to their organization and its critical assets
    Identify the threats presented by viruses, malware, active code, and Active
    Persistent Threats (APT) and consider the different mitigating options
    Apply the Computer Security Incident Response Team (CSIRT) framework, tools
    and capabilities to deliver cost effective and robust solutions to protect the
    organization
    Use Neuro Linguistic Programing (NLP) to deliver messages that will change the
    way employees work and think about security
    Study the area of wireless security protocols, their security attributes, and their
    potential insecurities within the organization, and in public spaces
    Illustrate how penetration testing and ethical hacking enhance organizational
    security
    Explore and apply two of the most important aspects in the modern day of
    cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

  • latest blog post
    INFORMATION SECURITY MANAGEMENT BEST PRACTICES

    Why Attend
    This course will provide participants with in-depth knowledge and practical skills to
    plan, deliver and monitor IT/cyber security to internal and external clients
    encompassing a complete, conjoined set of disciplines in the areas of IT policies,
    Security-Operational-Run-Book, security/penetration testing, ethical hacking and
    Back Hat hacking.
    It will also cover WiFi security, Website security, human factors, cyber forensic and
    CSIRT infrastructures.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure their own organization, and associated assets.
    Target Audience
    IT professionals, security professionals, auditors, site administrators, general
    management and anyone tasked with managing and protecting the integrity of the
    network infrastructure. This also includes anyone already familiar and involved with
    IT/cyber/digital security and seeking to build on their fundamental principles of
    security.
    Target Competencies
    Information security management
    Vulnerability assessment and
    management
    Cyber security solutions
    IT policies and procedures
    Cyber forensics
    Ethical hacking and Black Hat
    hacking
    Course Methodology
    The course will include practical sessions, videos as well as live examples [e.g. Virus]
    and a demonstrations of White and Black Hat Hacking tools. All participants will also
    be provided with the latest research papers and articles.
    As part of the course, participants will conduct a risk assessment of two different
    deployments based on the ISO27001 to identify any direct, or indirect threats,
    security exposures, or potentials for vulnerabilities. Participants will also respond to
    an example security incident and identify the best practices which could be applied
    to secure the organization, and associated assets.
    Course Objectives
    By the end of the course, participants will be able to:
    Apply information security standards to their organization and its critical assets
    Identify the threats presented by viruses, malware, active code, and Active
    Persistent Threats (APT) and consider the different mitigating options
    Apply the Computer Security Incident Response Team (CSIRT) framework, tools
    and capabilities to deliver cost effective and robust solutions to protect the
    organization
    Use Neuro Linguistic Programing (NLP) to deliver messages that will change the
    way employees work and think about security
    Study the area of wireless security protocols, their security attributes, and their
    potential insecurities within the organization, and in public spaces
    Illustrate how penetration testing and ethical hacking enhance organizational
    security
    Explore and apply two of the most important aspects in the modern day of
    cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence