Hotline: 1800 PROGRESO (1800 776 4737)


Protect Yourself and Your Organization From Cyber Threats (Workshop)

Using the Internet has become an integral part of life in the modern world. From communicating via email and instant message to traveling, banking and shopping, nearly every aspect of our life revolves around the cyber world.  

Because the Internet is so widely used, protecting vital information in the cyber world is necessary. Infected computer systems and mobile devices may be affected and damaged in a variety of ways, sometimes without a user even noticing. Some hackers are “playing a prank,” while others may be attempting to steal personal information such as credit card numbers, Social Security numbers, or other personal information.

Even worse, hackers can take control of an infected computer and use it to launch an attack on a larger system.  Even if your computer and mobile devices have no stored sensitive data, it can still be used to infect other computers and devices without your knowledge!

 In this series of technology security workshops, we aim to provide critical information and best practices on how to detect  & response to the various cyber and  mobile threat attack incidents that may be happen in our daily and  corporate life. These workshops are applicable to the stakeholders of the company, IT professionals, web application programmers, mobile application and IoTs developers and even the end-users of computers and mobile devices . 

 

Day1: Threat Detection & Incident Response (25 July 2016)

Overview:
Organizations need to approach security with this thought in mind: Hackers will get inside. And once they do, they will operate undetected for months by impersonating authorized users. This inside access enables them to do irreparable harm resulting in damaged reputations, financial losses and stolen intellectual property.
 
This workshop covers how to think about and analyse network security, methods for detecting cyber threats, as well as incident response and event handling activities. 

Objectives:
Trainees will learn on how attacks are performed, the skills necessary to perform an attack in the network environment and respond to cyber security incidents. 

Outlines:

1.    Assess information security risk in network environments 
2.    Create an information assurance life cycle process 
3.    Analyze threats to computing and network environments 
4.    Design secure computing and network environments 
5.    Operate secure computing and network environments 
6.    Assess the security posture within a risk management framework 
7.    Collect cyber security intelligence information 
8.    Respond to cyber security incidents 
 
Fee:
SGD 321 (Inclusive GST) 

 

Day 2: Mobile Forensics (26 July 2016)

Overview:
The use of phones in crime was widely recognized for some years, but the forensic study of mobile devices is a relatively new field, dating from the early 2000s. A proliferation of phones (particularly smartphones) on the consumer market caused a demand for forensic examination of the devices, which could not be met by existing computer forensics techniques. 

As a result of these challenges, a wide variety of tools exist to extract evidence from mobile devices. It is therefore recommended that forensic examiners, IT security professionals, application programmers, mobile users, etc. to undergo this basic training in order to understand how the tools and methods acquire evidences; how it maintains standards for forensic soundness. 

Obejctives:
Trainees will learn the basic information on Mobile Forensics and its challenges, how to gather mobile evidences and knowing the process with some demonstrations.

Outlines:
  1. Digital Forensics
  2. Understanding Digital Evidences
  3. Digital Forensics Challenges
  4. Mobile Device Forensics
  5. Mobile Forensics Process
  6. Understanding the Architecture
  7. Rooting Resources
  8. Mobile Treats and Security Demo
  9. Tools for Mobile Forensics Demo
Fee:
SGD 321 (Inclusive GST) 
 
Course Fee Includes:
  • Instructor-led Training
  • Printed Course Handbook; Softcopy Handbook;
  • Complimentary resources to work with the practical set of tool

 

Get EARLY BIRD DISCOUNT if you register 4 weeks before course commencement !

Download course-brochure Course Schedule
Related Courses
Information Systems Security Officer (CISSO)
The C)ISSO is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on...
Penetration Testing Engineer (CPTE)
The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning,...
Certified Penetration Testing Consultant (CPTC) - Live Virtual Training
The C)PTC is designed for cyber security professionals and IT network administrators who are interested in conducting Penetration tests against...
Certified Disaster Recovery Engineer (CDRE) - Live Virtual Training
The Certified Disaster Recovery Engineer certification course will prepare individuals to help their business handle the unexpected, while...
Certified Digital Forensics Examiner (CDFE) - Live Virtual Training
The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies in...
Certified Network Forensics Examiner (CNFE) - Live Virtual Training
The Certified Network Forensics Examiner will take your digital forensic skill set to the next level by navigating through over twenty modules of...
Certified Secure Web Application Engineer (CSWAE) - Live Virtual Training
The Certified Secure Web Application Engineer course is designed to equip students with the knowledge and tools needed to identify and defend...
Certified Incident Handling Engineer (CIHE) - Live Virtual Training
The Certified Incident Handling Engineer course is designed to help incident handlers, system administrators, and general security engineers...
Certified Wireless Security Engineer (CWSE)
The Certified Wireless Security Engineer is prepared to identify those risk that wireless networks present for a business and to create and...
Certified Security Sentinel (CSS)
The Certified Security Sentinel certification course trains students on how attacks are performed, how to identify an attack, and how to secure...
Certified Vulnerability Assessor (CVA)
The Certified Vulnerability Assessor training help students understand the importance of vulnerability assessments.
Certified Security Leadership Officer (CSLO) - Live Virtual Training
The Certified Security Leadership Officer course is designed to give management an essential understanding of current security issues, best...
Certified Professional Ethical Hacker (CPEH) - Live Virtual Training
The Certified Professional Ethical Hacker course is the introductory training to mile2’s line of penetration testing courses and certifications.
Certified Virtual Machine Engineer (CVME 5.5)
The Certified Virtual Machine Engineer course is designed for those who need to understand virtualization and the impacts it can have on an...
Certified Information Security Management Systems - Lead Auditor (CISMS-LA) - Live Virtual Training
The Certified Information Security Management Systems—Lead Auditor certification course prepares students to competently lead audits of...
Certified Information Security Management Systems Lead Implementer (CISMS-LI) - Live Virtual Training
The Certified Information Security Management Systems—Lead Implementer certification course prepares students to help any organization through...
Fundamentals of Cybersecurity Incident Handling
Basic introduction to the main incident handling tasks and critical thinking skills that will help an incident handler perform their daily work.
Secure Coding Bootcamp
Combination of lecture, security testing and code review. You will learn the most common threats against applications and how to design and code...
 
Your Name
Contact No
E-mail
Subject
Message
Text Limit :
Security Code
 
10
824
96