Practical Cyber Security
This course was designed to give cyber security workers a full set of tools to combat their day to day tasks. It will enhance executive and c-level with the required skills and tactics to make the best strategic decision for their organizations. It will also help them understand the jargon and ability to distinguish “snake oil” security products and effective one. For more technical teams this course will improve their level of training by introducing state of the art defense tactics and how to implement them in their organization.
Day 1:
Building rules and blocks of cybersecurity:
In this section of the course, we will examine the fundamental theories which followed by many organizations worldwide and constitute their cybersecurity strategy. This section teaches how these theories influence our short and long-term goals and decisions. Exploring theories such as: CIA TRIAD - Confidentiality, Integrity, and Availability cyber kill chain
The threat landscape:
Without a correct understanding of the threat landscape, security teams and key decision makers cannot defend their business and organizations. How will you decide on which type of attack you should focus your defense against? This section examines the current cyber threat landscape. From the most sophisticated cybercrime group and nation-state advanced persistent threat to the “Nigerian” spammers and spam malware.  Exploring their tactics and operational methods.
Practical Cyber Defense:
Now that we have the required knowledge of the threat landscape, we need to explore the current state of cybersecurity defense tactics and tools. This section focusses on cybersecurity products and tools available in the defenders' arsenal. It explores the benefits and downfalls of products such as Anti-Virus, Next-Gen Anti-Virus, Sandbox, Email Gateways, Big Data analytics, SIEM, and many others.
Day 2:
Practical Cyber Defense (continue)
Evaluating Security Status
Cyber Security is always moving; a good and reliable defender is one that never stops the process of evaluation. This section focuses on gaining the proper knowledge to find holes and methods to bypass security products and how to test how our defense resiliency against emerging and cutting-edge threats.
Practical Simulation:
After we have learned the use of cybersecurity strategic, the cyber threat landscape, Practical Cyber Defense and even how to evaluate our current Cyber Security Status now it's time to put it all to the test. In this practical section, the students are in charge of a task a task to secure a virtual organization. 
  • Facebook - Grey Circle
  • LinkedIn - Grey Circle
  • YouTube - Grey Circle
  • Instagram - Grey Circle