Executive Cyber Security Awareness Training Course
This course provides leaders and managers with an overview of issues and activities associated with cybersecurity.
Leaders will receive information in various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
By the end of this training, participants will be able to:
- Understand the Internet, social network Privacy
- Know PII and why it is important
- Know how to secure the Online Activates
- Know how to maintain the Privacy of business users
- Know more of the Cyber laws that protect the Privacy
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
Threat Actors and Their Motivation
- Cybercriminals
- Script kiddies
- State-sponsored hackers
- Hacktivists
- Insiders
- Researchers / white hackers
Types of Cyber Attacks
- Ransomware
- DDOS
- APT
Tactics and Techniques
- Phishing, vishing, smishing
- Malicious devices
- Physical security
- Brute force/password spray
- APT attacks
Cyber Resilience Strategy
- MITRE ATT&CK
- Defense-in-depth
- Security monitoring
- Disaster recovery
Personal Security
- Passwords security and multifactor authentication
- Darknet monitoring
- Secure Internet connection
- Data encryption
- Secure email
- Mobile security
Summary and Next Steps
Requirements
Basics of computer use
Basics of internet and email use
Open Training Courses require 5+ participants.
Executive Cyber Security Awareness Training Course - Booking
Executive Cyber Security Awareness Training Course - Enquiry
Executive Cyber Security Awareness - Consultancy Enquiry
Consultancy Enquiry
Testimonials (1)
I enjoyed refreshing my knowledge on the various subjects on cyber security. I was increasingly interested around cyber attacks, how they happen and what we (as an organisation) could potentially do to try and mitigate any risks. I did raise a question around AI in cyber attacks, and the answer was very in depth and interesting with a live example given on the spot.
Siobhan
Course - Executive Cyber Security Awareness
Upcoming Courses (Minimal 5 peserta)
Related Courses
389 Directory Server for Administrators
14 HoursPelatihan langsung yang dipimpin instruktur di Indonesia (online atau di tempat) ini ditujukan untuk sysadmin yang ingin menggunakan 389 Directory Server untuk mengonfigurasi dan mengelola autentikasi dan otorisasi berbasis LDAP.
Pada akhir pelatihan ini, peserta akan dapat:
- Instal dan konfigurasikan 389 Directory Server.
- Memahami fitur dan arsitektur 389 Directory Server.
- Pelajari cara mengonfigurasi server direktori menggunakan konsol web dan CLI.
- Siapkan dan pantau replikasi untuk ketersediaan tinggi dan penyeimbangan beban.
- Kelola LDAP autentikasi menggunakan SSSD untuk kinerja yang lebih cepat.
- Integrasikan 389 Directory Server dengan Microsoft Direktori Aktif.
Active Directory for Admins
21 HoursPelatihan langsung yang dipandu instruktur di Indonesia (online atau di tempat) ini ditujukan untuk administrator sistem yang ingin menggunakan Microsoft Direktori Aktif untuk mengelola dan mengamankan akses data.
Pada akhir pelatihan ini, peserta akan dapat:
- Siapkan dan konfigurasikan Direktori Aktif.
- Siapkan domain dan tentukan hak akses pengguna dan perangkat.
- Kelola pengguna dan mesin melalui Kebijakan Grup.
- Kontrol akses ke server berkas.
- Siapkan Layanan Sertifikat dan kelola sertifikat.
- Terapkan dan kelola layanan seperti enkripsi, sertifikat, dan autentikasi.
C/C++ Secure Coding
21 HoursThis three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure code.
Advanced Java Security
21 HoursEven experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java.
The course – besides introducing security components of Standard Java Edition – deals with security issues of Java Enterprise Edition (JEE) and web services. Discussion of specific services is preceded with the foundations of cryptography and secure communication. Various exercises deal with declarative and programmatic security techniques in JEE, while both transport-layer and end-to-end security of web services is discussed. The use of all components is presented through several practical exercises, where participants can try out the discussed APIs and tools for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform and web-related vulnerabilities. Besides the typical bugs committed by Java programmers, the introduced security vulnerabilities cover both language-specific issues and problems stemming from the runtime environment. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Understand security concepts of Web services
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Understand security solutions of Java EE
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get practical knowledge in using security testing tools
- Get sources and further readings on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only know how to use the various security features of the Java environment (positive security), but should also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).
The introduction of security services is preceded with a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get sources and further readings on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursA number of programming languages are available today to compile code to .NET and ASP.NET frameworks. The environment provides powerful means for security development, but developers should know how to apply the architecture- and coding-level programming techniques in order to implement the desired security functionality and avoid vulnerabilities or limit their exploitation.
The aim of this course is to teach developers through numerous hands-on exercises how to prevent untrusted code from performing privileged actions, protect resources through strong authentication and authorization, provide remote procedure calls, handle sessions, introduce different implementations for certain functionality, and many more.
Introduction of different vulnerabilities starts with presenting some typical programming problems committed when using .NET, while the discussion of vulnerabilities of the ASP.NET also deals with various environment settings and their effects. Finally, the topic of ASP.NET-specific vulnerabilities not only deals with some general web application security challenges, but also with special issues and attack methods like attacking the ViewState, or the string termination attacks.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn to use various security features of the .NET development environment
- Get practical knowledge in using security testing tools
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in .NET and ASP.NET
- Get sources and further readings on secure coding practices
Audience
Developers
Microsoft SDL Core
14 HoursThe Combined SDL core training gives an insight into secure software design, development and testing through Microsoft Secure Development Lifecycle (SDL). It provides a level 100 overview of the fundamental building blocks of SDL, followed by design techniques to apply to detect and fix flaws in early stages of the development process.
Dealing with the development phase, the course gives an overview of the typical security relevant programming bugs of both managed and native code. Attack methods are presented for the discussed vulnerabilities along with the associated mitigation techniques, all explained through a number of hands-on exercises providing live hacking fun for the participants. Introduction of different security testing methods is followed by demonstrating the effectiveness of various testing tools. Participants can understand the operation of these tools through a number of practical exercises by applying the tools to the already discussed vulnerable code.
Participants attending this course will
-
Understand basic concepts of security, IT security and secure coding
-
Get known to the essential steps of Microsoft Secure Development Lifecycle
-
Learn secure design and development practices
-
Learn about secure implementation principles
-
Understand security testing methodology
- Get sources and further readings on secure coding practices
Audience
Developers, Managers
FreeIPA for Administrators
14 HoursPelatihan langsung yang dipandu instruktur di Indonesia (online atau di tempat) ini ditujukan untuk administrator sistem yang ingin menggunakan FreeIPA untuk memusatkan informasi autentikasi, otorisasi, dan akun untuk pengguna, grup, dan mesin di organisasi mereka.
Pada akhir pelatihan ini, peserta akan dapat:
- Instal dan konfigurasikan FreeIPA.
- Kelola Linux pengguna dan klien dari satu lokasi pusat.
- Gunakan CLI, UI Web, dan antarmuka RPC FreeIPA untuk mengatur dan mengelola izin.
- Aktifkan autentikasi Single Sign On di seluruh sistem, layanan, dan aplikasi.
- Integrasikan FreeIPA dengan Windows Active Directory.
- Cadangkan, replikasi, dan migrasikan server FreeIPA.
Identity and Access Management with Okta
14 HoursPelatihan langsung yang dipimpin instruktur di Indonesia (online atau di tempat) ini ditujukan untuk administrator sistem yang ingin menggunakan Okta untuk manajemen identitas dan akses.
Pada akhir pelatihan ini, peserta akan dapat:
- Konfigurasikan, integrasikan, dan kelola Okta.
- Integrasikan Okta ke dalam aplikasi yang ada.
- Terapkan keamanan dengan autentikasi multifaktor.
OpenLDAP for Linux Systems
7 HoursOpenLDAP adalah perangkat lunak sumber terbuka untuk mengimplementasikan Protokol LDAP (Direktori Ringan Access), yang memungkinkan pengelolaan dan akses ke direktori informasi. Jest adalah server direktori populer yang dapat digunakan untuk menyimpan dan berbagi data tentang pengguna, grup, sumber daya jaringan, dan objek lain di jaringan.
OpenLDAP Workshop
21 HoursPelatihan langsung yang dipimpin instruktur di Indonesia (daring atau tatap muka) ini ditujukan untuk administrator sistem dan profesional IT tingkat menengah yang ingin menginstal, mengonfigurasi, mengelola, dan melindungi direktori LDAP menggunakan OpenLDAP.
Selesai pelatihan ini, peserta akan dapat:
- Mengerti struktur dan operasi dari direktori LDAP.
- Menginstal dan mengonfigurasi OpenLDAP untuk berbagai lingkungan penempatan.
- Menerapkan mekanisme kontrol akses, autentikasi, dan replikasi.
- Menggunakan OpenLDAP dengan layanan dan aplikasi pihak ketiga.
Identity and Access Management using OpenAM
14 HoursPelatihan langsung yang dipimpin instruktur di Indonesia (online atau di tempat) ini ditujukan untuk administrator sistem yang ingin menggunakan OpenAM untuk mengelola kontrol identitas dan akses untuk aplikasi web.
Pada akhir pelatihan ini, peserta akan dapat:
- Siapkan lingkungan server yang diperlukan untuk mulai mengonfigurasi autentikasi dan kontrol akses menggunakan OpenAM.
- Terapkan fitur masuk tunggal (SSO), autentikasi multifaktor (MFA), dan layanan mandiri pengguna untuk aplikasi web.
- Gunakan layanan federasi (OAuth 2.0, OpenID, SAML v2.0, dll.) untuk memperluas manajemen identitas secara aman di berbagai sistem atau aplikasi.
- Access dan mengelola layanan autentikasi, otorisasi, dan identitas melalui REST API.
OpenDJ for Administrators
14 HoursPelatihan langsung yang dipimpin instruktur di Indonesia (online atau di tempat) ini ditujukan untuk administrator sistem yang ingin menggunakan OpenDJ untuk mengelola kredensial pengguna organisasi mereka dalam lingkungan produksi.
Pada akhir pelatihan ini, peserta akan dapat:
- Instal dan konfigurasikan OpenDJ.
- Pertahankan server OpenDJ, termasuk pemantauan, pemecahan masalah, dan pengoptimalan kinerja.
- Buat dan kelola beberapa OpenDJ database.
- Cadangkan dan migrasikan server OpenDJ.