[PyFeyn] TRAINING COURSE ON ADVANCED CYBER SECURITY, SYSTEMS AUDIT AND ICT COUNTER INTELLIGENCE SOLUTIONS

Skills for Africa Training Institute workshops at skillsforafrica.or.ke
Tue Mar 21 11:02:27 GMT 2023


<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KOKTELeLsJYhfgt9Th06IMPmJa5k084BdLcnKbgvhYeGCu-AdG4yTlsufg-6rZK1DM5-l75leIM3xDJAwDA8wH2ud-fGHsGs3tLQjAk8JJ1Fns1>
TRAINING COURSE ON ADVANCED CYBER SECURITY, SYSTEMS AUDIT 
AND ICT COUNTER INTELLIGENCE SOLUTIONS

Dates
Fees
Location
Apply
03/04/2023 - 14/04/2023
$2700
Nairobi

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPC4igJv5jy6PFafBII7I1d3ZC8M0glRvxFQIZGre3WDPEyR1zBG_ys1a9yflTmtbRPuMPwX4MLnnMY-kf9vMH8wLVl6DSyzuSKIdn385Jwvgs0>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuXqL3F8TfDg39wEdaTekhqWod1-GRpLwjF5BAStj0TETA1UINJKqfpXKxXbfc-hmhdVeOT53x1mJMsbywSv2jBMpFX0H0sC0DhX95cHXaKBHI0>
Online 
    Class
01/05/2023 - 12/05/2023
$4500
Dubai

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPOVZb7VNhhkPeE5Z03wAIVsdTzEGZx4lmAdNx2OO7SoU-RSOdOXVuC3D1hSbG1inSQvGuTzfzBX4BAqG0pHqmZQ3IHGW9AiDn29fYnWr15mJx0>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuew4lFDvGwVyMDcJwo5xbXCg6Q1OnZDdqTlftmtrGyo60OYviqqAYLrSDwITCICMbm1X9CkOjw5kR98ZaSeEgys9NBbqercFvuq8qP7DOo2xb0>
Online 
    Class
05/06/2023 - 16/06/2023
$3000
Mombasa

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPy-qvfWta1RPh5l1Qw_ig45laKvxuft0h0-KYLRjU3tOnyEngpINrHb6lrf5bJvWvDQK2ioTGQ7_EF0Msb_MiX2oulHrkIe_bmLwYgNvEa0PW0>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuh07ejP5MeecpmzZGHDM3EsHL5l32rEOQakYQMaunVTG-sDalMEVtJZexHw3f8QBEWsuMZTeMBGNXVxYCVBRkvcGyHXqhcwEE-LmCGIpk7xfa0>
Online 
    Class
03/07/2023 - 14/07/2023
$3500
Kigali

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPisD_mkMzLexK8RuyNj88sE9WYPnm524e6ztOU2LA3jUvJUY_5crr3NScfFKzzei4ofcGBSY8vDW2ZpqOwzphtE4FbV7ilMH6eM2vCLF07On40>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMul41DPGYMBWKXGQO6i5FUXyABugtlW31Kb6Ek2u5C88JNXOi7bHF1drSfNRGhftTAZi7xnssMra8UOjYkJb80r6MAbGCemZpnl2m0P60WJQkL0>
Online 
    Class
07/08/2023 - 18/08/2023
$2700
Nairobi

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPL7ZThI_hKD7O25UTiVCzQSZhvyZO9KmOkhSnDXFLz8qwrBrY6CAeGMH0AN17ksjKwhhdf_ZeoUoaxZ4VGHFEBT8nJEQjmJBGYaQm9eM-S-6_0>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuoaKMWd8w8UNHvfGm1ORecj7-wn6lto6hdwEemPwyuuKip5C8rT2MSgfKfHk_6nf6nhpreThqDqiYq9WrpGdpOq0uHoWu6Pwgz17Xvvo7fZ4r0>
Online 
    Class
04/09/2023 - 15/09/2023
$3000
Mombasa

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPET-M3hOUJ8L952hnp2V1uJljWZV9uw-lJWUzwneUJHIyd5GQK9rIcGR2Di3UmxA674aReouhoJNO9C0ZkrDe5EFQcSIErdTGNIj35B8p7JbI0>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMugDZQpL8V8Mtap5y2felJUpOetS1pms3FRntOtg7ONFTZ2XaotmcNeYOPehn0rOKkf_BPdCvN0l5oasFe86iRd2OvKKZkV41sGzxz1feX09Ey0>
Online 
    Class
02/10/2023 - 13/10/2023
$3500
Kigali

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPfarjk_VZy9BdcI2uAgnFwxJtU-4VqC2x6th8Bf0eNjSs9dlnsYg0piqRMfy0FKTi_2tLQMBEAGSAizRCBs9M96uy3m9fgzZrjlqtLNh09H6c0>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMuYCQEjJH3ANbQ9wVoXprwvLMvcnvnWAp8dQGY5WzO9l8iVOQWed72dTfdWa4Zw4JoSvvW69oncVAj_brMQDCwgvqgyREp30acD86MVb7Bkzkt0>
Online 
    Class
06/11/2023 - 17/11/2023
$3000
Mombasa

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPguqIjR6Hl0po_2ZCmZUxDy4rO9M-cOZlJzag3CCSrL5s0nOt9VqSktpcBq4ggcwydxhY8zxXo578g4ecLYq3YEYiZuTEuamWrODsCVXVzve70>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu8uLb1StPwYNoYZGwowpxbrqq_O9GArI8OqhGfNsCFQ-Qck0urIVBby0glMBcEJ-sfPpECo3DKxbFDL5vGvcIdrFXaJAbhUMFNyctoCyUmkyW0>
Online 
    Class
04/12/2023 - 15/12/2023
$2700
Nairobi

<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtOqpmLBxXy0yBFbHXpgrdoPPabceaxK13ZBtVfEQFqPz1MxuhYQZMYACL3lrDom6uQ_IRJmEASNrPbitGC3fU_vxlJGpHBqzwWCpGlBARmRjPAPULJken55X77O4QiHr3i00>
Physical Class


<https://133IK.trk.elasticemail.com/tracking/click?d=Woapoy-pTrFhh792RHeJ9-Rt225YYsPmWjNWsqqrTtMNryFu5qW7KnnyuoRWxTMu39iQPqPRyvSqU8n0F8S4rFefIGbcydPWzG_6qy_THfMCpXpk6UTC1m4100CKAm_Zom1yI-69D2UwiYuZMDWqHuYC403np-XOJccMItCzO1DR0>
Online 
    Class

<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KNTFFNY6jLTlannTsFNp1-e46cmAEy6DP3luHrGg2RPnERIb3KWbbevUkUBmS9Dl0HmAqsdCzOB_K9c28JhdEVVC2l3BViR5JzK2s9pUwLlGmk1>
Calendar for 2023 
Workshops
 

<https://133IK.trk.elasticemail.com/tracking/click?d=4RSOGeS5HI6KFJixQpykUH7SBDSj0A2EdHdcqqEk-KM-cgdd93er8oiDD9RVWshiMmf2V2dozLdKIALaYUFbin8-To607Wm0aKAtVfHM9jtVgbaCNpXj7X75h-VU41-WR2jdSjCmsLjeb1L2ICLrrm81>
Contact 
us
 

<https://133IK.trk.elasticemail.com/tracking/click?d=TdO1gCuQ71hpWL60BWNntuwf2IWJfk_kJQ_Oex5_ejjxKwO9e8XGsKnbIiI6uZ9PJp2lkiYRlxT4P3CF_ykhbS-49KHbRQQWxs3oMGAQbp5B2rtoshmPw5RPjQ7bbss_mbZ-G0noW7KOlAjBjyPsRnQ1>
Whatapp
 
INTRODUCTION
Information 
and know-how are valuable company assets, and in times of fierce competition, 
organizations need to protect their information and systems against the threat 
of corporate espionage. Many organizations are unaware of potential information 
leaks, and as a result counterintelligence operations are neglected or are 
simply a series of routine technical measures. However, employees typically 
represent a major weak spot for organizations – which means that existing 
processes and structures for information flows need to be 
challenged.
Empirical 
research indicates that most information losses are traced back to a company’s 
employees, or the personnel of its suppliers, customers, or partners – all of 
whom have access to confidential information.
The 
training will look at the different threats organizations might face and ways in 
which they can protect and secure it against attacks. Participants will also 
learn how to set up counterintelligence processes that involve collecting 
information and conducting counterintelligence activities.
Course 
Objectives
By 
the end of this course, participants should be able to:
·       
Know the purpose of a 
cybersecurity audit
·       
Define cybersecurity audit 
controls
·       
Identify cybersecurity audit 
frameworks
·       
Explain proper audit team 
performance
·       
Define the benefits of a 
cybersecurity audit
·       
Learn how to identify vulnerable 
points within your organization and how to secure them.
Run 
  awareness campaigns among your colleagues in order to raise awareness of 
  espionage threats and protect them from attacks.
Develop 
  in-depth knowledge of the various forms of contemporary espionage 
  threats.
Master 
  how to identify, monitor, and evaluate information 
  risks.
Become 
  familiar with ethical and legal counterintelligence activities and 
  techniques.
Seize 
  the opportunity to share experience and knowledge with competitive/market 
  intelligence experts and peers from a range of industries.
Duration
14 
Days
Who 
should Attend
·       
Individuals involved in 
cybersecurity management
·       
Learning and development 
professionals
·       
Internal 
auditors
IT 
  professionals and managers working with information systems, who need to 
  understand best practices and standards to ensure security and integrity of 
  these systems
·       
Individuals seeking to gain 
knowledge about the main processes of auditing a cybersecurity 
program
·       
Individuals interested to pursue 
a career in cybersecurity audit
Competitive/Market 
  Intelligence Analysts and Managers
Knowledge 
  and Information Managers
Specialists 
  from R&D, Technology and Risk Management
COURSE 
CONTENT
What 
is a Cybersecurity Audit?
·       
Introduction
·       
What is a Cybersecurity 
Audit?
·       
When to Perform a Cybersecurity 
Audit
Controls 
and Frameworks
·       
Cybersecurity Audit 
Controls
·       
Cybersecurity Audit 
Frameworks
Completing 
the Audit
·       
The Audit
·       
Audit 
Completion
Understanding 
Cyber Threat Intelligence
·       
Defining 
Threats
·       
Understanding 
Risk
·       
Cyber Threat Intelligence and 
Its Role
·       
Expectation of Organizations and 
Analysts
·       
Diamond Model and Activity 
Groups
·       
Four Types of Threat 
Detection
·       
Process of auditing information 
systems
·       
Governance and management of 
IT
·       
Information systems’ 
acquisition, development and implementation
·       
Protection of information 
assets
·       
Information systems’ operation, 
maintenance and service management
Threat 
Intelligence Consumption
·       
Sliding Scale of 
Cybersecurity
·       
Consuming Intelligence for 
Different Goals
·       
Enabling Other Teams with 
Intelligence
Positioning 
the Team to Generate Intelligence
·       
Building an Intelligence 
Team
·       
Positioning the Team in the 
Organization
·       
Prerequisites for Intelligence 
Generation
Planning 
and Direction (Developing Requirements)
·       
Intelligence 
Requirements
·       
Priority Intelligence 
Requirements
·       
Beginning the Intelligence 
Lifecycle
·       
Threat 
Modeling
Recent 
cybercrime trends
·       
Cyberwar attacks leading to the 
shutdown of production facilities or utilities (e.g. Stuxnet, 
Emotet).
·       
Ransomware trojans and smart 
viruses.
Recent 
espionage threats and protection
·       
Risk audits: Identification, 
monitoring, and evaluation of risks for information theft.
·       
Electronic eavesdropping — 
reality or fiction?
·       
Audio-visual information 
gathering.
·       
Product piracy.
Information 
drainage through social engineering
·       
Threats: Elicitation, back-door 
recruitment, external personnel, Romeo approaches, social media activities 
(sockpuppets), and pretext calls.
·       
Protection: Vulnerability 
analysis, employee training, and never-talk-to-strangers 
policies.
Security 
of data and communication networks
·       
Protection against hacking and 
orchestrated attacks.
·       
The weak spot — exploiting the 
human factor.
·       
Opportunities and limitations 
for technical counterintelligence solutions.
·       
Secure communication: Safe data 
transfer methods, minimization of communication risks, and protection of 
corporate communication structures.
·       
Internet: How to securely 
conduct research, transfer data, and avoid harmful 
software.
·       
Illustration of attacks with 
numerous small case studies.
Counterintelligence: 
The role of CI/MI professionals in espionage 
protection.
·       
Prevention 
campaigns.
·       
Penetration tests for an 
outside-in perspective.
·       
Briefing/de-briefing of 
colleagues with sensitive external contacts.
 
 
THE 
END
 
 
 
 
<https://133IK.trk.elasticemail.com/tracking/unsubscribe?d=iFsE0jaCzNIchabGyKkNYnNh3R5ZDU1CymtjYORz6oWizBfKoihBmC9eQPPatyM5wnwKf3Dlal0gmPOz6OSL4ZBDk9U6ILpvy-bQQk0KFcRH0>
UNSUBSCRIBE
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.hepforge.org/lists-archive/pyfeyn/attachments/20230321/ff154b41/attachment.html>


More information about the PyFeyn mailing list