4
CYBERSECURITY TRAINING Challenges of Designing a Secure System Cybersecurity Foundation GULF COOPERATION COUNCIL INTERCONNECTION AUTHORITY 2731 January 2019 course fee: USD 2,000 per participant For more details please contact: Rabee Al-Maqabi, ICC System Section Head GCCIA, [email protected] , Fax +966 013 821-1766 Tel: +966 013 821-4360 "The reality in today’s connected world is that there can be no absolute security. However, having knowledge on the potential risk will help an organization mitigate and manage these risks and protect the system against unathorized access." GCCIAICCS, GCCCIGRE 2017 Jumeirah Messilah Beach Hotel & Spa Kuwait

Jumeirah Messilah Beach Hotel & Spa Kuwait ... - GCCIA

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Jumeirah Messilah Beach Hotel & Spa Kuwait ... - GCCIA

CYBERSECURITYTRAINING

Challenges of Designing a Secure System

Cybersecurity Foundation

GULF COOPERATION COUNCIL INTERCONNECTION AUTHORITY

27­31 January 2019

course fee: USD 2,000 per participant

For more details please contact: Rabee Al-Maqabi, ICC System Section Head GCCIA, [email protected] , Fax +966 013 821-1766 Tel: +966 013 821-4360

"The reality in today’s connected world is that there

can be no absolute security. However, having

knowledge on the potential risk will help an

organization mitigate and manage these risks and

protect the system against unathorized access." ­

GCCIA­ICCS, GCC­CIGRE 2017

Jumeirah Messilah Beach Hotel & Spa Kuwait

Page 2: Jumeirah Messilah Beach Hotel & Spa Kuwait ... - GCCIA

COURSE OVERVIEW & OBJECTIVES

OBJECTIVES

After this course, participants will gain in­depth

understanding about cybersecurity and the

importance of having a secure infrastructure.

Moreover, participants will have a better

understanding on the following;

Current cyber threats and cybersecurity site

references.

How Security zones and detailed logging

augment information assurance.

Government­mandated directives and

compliance requirements.

Forensic challenges and incident response

planning.

Cyber roles required to successfully design a

secure system.

Risk management process.

The attack cycle perpetrated by malicious

hackers.

Goals achievable with auditing, scanning,

and testing systems.

Enterprise policy requirements.

Industry recommendations for maintaining

secure access control.

Best strategies for securing the enterprise

with layered defenses.

Standards­based cryptographic solution for

securing communications.

COURSE OVERVIEW

In this cybersecurity course, participants will

gain a global perspective of the challenges of

designing a secure system, touching on all the

cyber roles needed to provide a cohesive

security solution.

Through lecture, labs, and breakout discussion

groups, participants will learn about current

threat trends across the Internet and their

impact on organizational security.

Participants will review standard cybersecurity

terminology and compliance requirements,

examine sample exploits, and gain hands­on

experience mitigating controls. In a contained

lab environment, participants will work with

live viruses, including botnets, worms, and

Trojans. In addition to technical cybersecurity

components, participants will learn and explore

the non­technical aspects of cybersecurity

necessary to mitigate risk and lessen

exposure, including risk management, threat

determination, disaster recovery, security

policy management, and business continuity

planning. This course provides an excellent

foundation for those proceeding to CISSP,

CEH, CISA, or CISM training.

Challenges of Designing a Secure System

Cybersecurity FoundationJumeirah Messilah Beach Hotel & Spa Kuwait, 27­31 January 2019

Page 3: Jumeirah Messilah Beach Hotel & Spa Kuwait ... - GCCIA

COURSE CONTENT /SCHEDULE

Cybersecurity Awareness

Data Security and Architecture

Identity Management, Malware & Social Engineering

Software & Physical Security

Incident Response & Trends

27 January 2019 Module 1: Cybersecurity AwarenessModule 2: Network DiscoveryModule 3: Systems Hardening

28 January 2019

Module 4: Security ArchitectureModule 5: Data SecurityModule 6: Public Key Infrastructure

29 January 2019 Module 7: Identity ManagementModule 8: Network HardeningModule 9: Malware Module 10: Social Engineering

30 January 2019

Module 11: Software SecurityModule 12: Environment MonitoringModule 13: Physical Security

31 January 2019

Module 14: Incident ResponseModule 15: Legal ConsiderationsModule 16: Trends in Cybersecurity

DAY 1

DAY 2

Challenges of Designing a Secure System

Cybersecurity Foundation

DAY 3

DAY 4

DAY 5

Jumeirah Messilah Beach Hotel & Spa Kuwait, 27­31 January 2019

Page 4: Jumeirah Messilah Beach Hotel & Spa Kuwait ... - GCCIA

About the Trainor

Challenges of Designing a Secure System

Cybersecurity FoundationJumeirah Messilah Beach Hotel & Spa Kuwait, 27­31 January 2019

ENG. AHMED AMIN Cybersecurity Product Manager ­ MEA,

Global Knowledge

Ahmed’s specialty is network/application penetrationtesting and vulnerability assessments. Many of hiscustomers span large financial institutions, which hasafforded opportunity to perform BITS certification testingfor financial applications. In addition, Ahmed hasexperience assessing, designing, and managing highlyavailable Firewall, VPN, and IDS solutions. He hasperformed administration and extensive securityassessments across multiple platforms, as well asperformed security policy and technical standardsdevelopment targeting UNIX, Windows and Cisco IOShardening and auditing. Ahmed has also performedbusiness continuity/disaster recovery planning indatacenter environments.

Ahmed is a certified instructor with unique ability ofdelivering the information using his extensive securityexperience and his Master of Cybersecurity from EC­Council University, USA. (2015 – 2017) and ability todeliver the below wide range of security training

Information Security Related Courses:

CEH v.8 – (Certified Ethical Hacking) ExaminationPreparation Course CHFI – Certified Hacking Forensic Investigator ECSA/LPT – EC­Council Certified SecurityAnalyst/Licensed Penetration Tester CompTIA Security+ Course CISSP ­ Certified Information System SecurityProfessional. ENSA – EC­Council Network Security Administrator CISA – Certified Information Systems Auditor

Delivery in MEA

Customer deliveries include; UAEAir force ­ UAE Navy ­ Oman MOD­ UAE MOD ­ KSA National GuardHealth Affairs ­ KSA MilitarySurvey Departments – UAE Police The average MTM evaluation scoreis 4.71/5 over 2017 and 2018