Executive Cyber Security Awareness Training Course
This course offers leaders and managers an overview of the issues and activities related to cybersecurity.
Leaders will gain insights into various topics that will enhance their knowledge and sharpen their executive decision-making skills concerning cybersecurity threats.
By the end of this training, participants will be able to:
- Grasp the concepts of Internet and social network privacy.
- Understand PII (Personally Identifiable Information) and its significance.
- Learn how to secure online activities.
- Master the methods for maintaining business user privacy.
- Become familiar with cyber laws that safeguard privacy.
Format of the Course
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange the details.
Course Outline
Introduction
Threat Actors and Their Motivation
- Cybercriminals
- Script kiddies
- State-sponsored hackers
- Hacktivists
- Insiders
- Researchers / white hackers
Types of Cyber Attacks
- Ransomware
- DDOS
- APT
Tactics and Techniques
- Phishing, vishing, smishing
- Malicious devices
- Physical security
- Brute force/password spray
- APT attacks
Cyber Resilience Strategy
- MITRE ATT&CK
- Defense-in-depth
- Security monitoring
- Disaster recovery
Personal Security
- Passwords security and multifactor authentication
- Darknet monitoring
- Secure Internet connection
- Data encryption
- Secure email
- Mobile security
Summary and Next Steps
Requirements
Basics of computer use
Basics of internet and email use
Need help picking the right course?
Executive Cyber Security Awareness Training Course - Enquiry
Testimonials (1)
I enjoyed refreshing my knowledge on the various subjects on cyber security. I was increasingly interested around cyber attacks, how they happen and what we (as an organisation) could potentially do to try and mitigate any risks. I did raise a question around AI in cyber attacks, and the answer was very in depth and interesting with a live example given on the spot.
Siobhan
Course - Executive Cyber Security Awareness
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at sysadmins who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
C/C++ Secure Coding
21 HoursThis three-day course delves into the fundamentals of safeguarding C/C++ code from malicious users who could exploit various vulnerabilities related to memory management and input handling. It also emphasizes the principles of developing secure code.
Advanced Java Security
21 HoursEven seasoned Java developers may not fully grasp the diverse security features provided by Java, nor are they always informed about the various vulnerabilities pertinent to web applications developed in Java.
This course – while introducing the security aspects of Standard Java Edition – also addresses the security concerns related to Java Enterprise Edition (JEE) and web services. It begins with an overview of cryptography and secure communication before delving into specific security services. Exercises focus on both declarative and programmatic security methods in JEE, as well as transport-layer and end-to-end security for web services. Participants will engage in practical exercises to explore the discussed APIs and tools firsthand.
The course also examines and elucidates common and critical programming errors associated with the Java language and platform, along with web-related vulnerabilities. It covers both typical mistakes made by Java developers and broader issues related to the runtime environment. Each vulnerability and its corresponding attacks are illustrated through straightforward exercises, followed by recommended coding practices and mitigation strategies.
Participants in this course will
- Gain a foundational understanding of security principles, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten list and how to prevent them
- Acquire knowledge on the security aspects of Web services
- Master various security features within the Java development environment
- Develop a practical understanding of cryptography
- Understand security solutions in Java EE
- Be informed about typical coding errors and how to avoid them
- Stay updated on recent vulnerabilities in the Java framework
- Aquire hands-on experience with security testing tools
- Receive resources for further reading on secure coding practices
Audience
Developers
Standard Java Security
14 HoursDescription
The Java language and its Runtime Environment (JRE) were crafted to avoid the most common security issues found in other languages, such as C/C++. However, software developers and architects must not only be proficient with the various security features of the Java environment (positive security), but also be knowledgeable about the vulnerabilities that still affect Java development (negative security).
Before delving into security services, a brief overview of cryptography fundamentals is provided to establish a common understanding of the purpose and operation of relevant components. Participants will have hands-on experience with these components through several practical exercises where they can test out the discussed APIs.
The course also examines and explains the most frequent and serious programming flaws in Java language and platform, covering both typical errors made by Java programmers and issues specific to the language and environment. All vulnerabilities and related attacks are demonstrated through straightforward exercises, followed by recommended coding guidelines and mitigation techniques.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding practices
- Acquire knowledge of Web vulnerabilities beyond the OWASP Top Ten and learn how to prevent them
- Master the use of various security features in the Java development environment
- Gain practical insights into cryptography
- Be informed about common coding mistakes and how to avoid them
- Stay updated on recent vulnerabilities within the Java framework
- Receive resources and additional readings for secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursIn the modern programming landscape, several languages can compile code to the .NET and ASP.NET frameworks. While these environments offer robust security features, developers must be adept at applying both architectural and coding techniques to effectively implement security measures and mitigate vulnerabilities.
This course is designed to equip developers with practical skills through extensive hands-on exercises. Participants will learn how to prevent unauthorized actions by untrusted code, safeguard resources via strong authentication and authorization mechanisms, facilitate remote procedure calls, manage sessions, explore various implementations for specific functionalities, and much more.
The curriculum begins by highlighting common programming errors encountered when working with .NET, followed by an in-depth look at ASP.NET vulnerabilities. This includes discussions on environmental settings and their implications, as well as unique security challenges such as attacks targeting ViewState or string termination issues.
Participants of this course will
- Grasp fundamental principles of IT security and secure coding practices
- Identify Web vulnerabilities beyond the OWASP Top Ten list and learn to prevent them
- Familiarize themselves with various security features within the .NET development environment
- Acquire practical experience in using security testing tools
- Recognize typical coding errors and strategies for avoiding them
- Stay informed about recent vulnerabilities in .NET and ASP.NET
- Access resources and additional readings on secure coding practices
Audience
Developers
Microsoft SDL Core
14 HoursThe integrated SDL core training offers an in-depth look into the principles of secure software design, development, and testing using Microsoft's Secure Development Lifecycle (SDL). It begins with a foundational overview of SDL components at level 100, followed by practical techniques for identifying and resolving issues early in the development process.
During the development phase, the course covers common security-related programming errors in both managed and native code. Attack methods are demonstrated alongside mitigation strategies, all illustrated through interactive exercises that provide a hands-on hacking experience for participants. The training also introduces various security testing approaches and showcases the effectiveness of different testing tools. Participants will gain an understanding of these tools through practical applications to previously discussed vulnerable code.
Participants in this course will
- Grasp fundamental concepts of security, IT security, and secure coding practices
- Become familiar with the key stages of Microsoft's Secure Development Lifecycle
- Acquire knowledge on secure design and development methodologies
- Learn about principles for secure implementation
- Understand security testing methods
- Receive resources and additional reading materials on secure coding practices
Audience
Developers, Managers
Security Testing
14 HoursUpon gaining an understanding of vulnerabilities and attack methods, participants delve into the general approach and methodology for security testing, along with techniques to uncover specific weaknesses. Security testing begins with gathering information about the system (the Target of Evaluation or ToC), followed by comprehensive threat modeling to identify and prioritize all threats, leading to a risk analysis-driven test plan.
Security evaluations can occur at various stages of the Software Development Life Cycle (SDLC). We cover design reviews, code reviews, reconnaissance, information gathering about the system, testing the implementation, and securing the environment for deployment. Detailed introductions are provided on several security testing techniques such as taint analysis, heuristic-based code review, static code analysis, dynamic web vulnerability testing, and fuzzing. Various tools that automate software product security evaluations are also introduced, supported by exercises where these tools are used to analyze previously discussed vulnerable code. Real-life case studies enhance the understanding of different vulnerabilities.
This course equips testers and QA staff with the skills needed to effectively plan and execute security tests, choose and apply appropriate tools and techniques to detect even hidden security issues, providing practical knowledge that can be immediately applied in their work.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding practices
- Learn about web vulnerabilities beyond the OWASP Top Ten list and how to prevent them
- Familiarize themselves with client-side vulnerabilities and secure coding techniques
- Understand different approaches and methodologies for security testing
- Acquire practical knowledge in using various security testing methods and tools
- Receive resources and additional readings on secure coding practices
Audience
Developers, Testers
Secure Web Application Development and Testing
21 HoursSafeguarding web-accessible applications necessitates a security expert who remains vigilant about current attack methods and trends. Numerous technologies and environments facilitate the comfortable development of web applications. It is crucial to be aware not only of the security issues pertinent to these platforms but also of general vulnerabilities that apply regardless of the chosen development tools.
This course provides an overview of applicable security solutions in web applications, with a particular emphasis on comprehending essential cryptographic solutions. It covers various web application vulnerabilities from both server-side (following the OWASP Top Ten) and client-side perspectives, illustrated through relevant attacks and followed by recommended coding techniques and mitigation methods to avoid associated issues. The course concludes its discussion of secure coding by addressing common security-related programming errors in input validation, improper use of security features, and code quality.
Testing is a critical component in ensuring the security and robustness of web applications. Different approaches—from high-level auditing through penetration testing to ethical hacking—can be employed to identify various types of vulnerabilities. However, to go beyond easily detectable issues, security testing must be well-planned and properly executed. Remember: security testers should ideally uncover all potential bugs to protect a system, while adversaries only need to find one exploitable vulnerability to breach it.
Practical exercises will aid in understanding web application vulnerabilities, programming errors, and crucial mitigation techniques. Hands-on trials of various testing tools—from security scanners through sniffers, proxy servers, fuzzing tools to static source code analyzers—will equip participants with essential practical skills that can be immediately applied at the workplace.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and how to avoid them
- Understand client-side vulnerabilities and secure coding practices
- Achieve a practical understanding of cryptography
- Comprehend various security testing approaches and methodologies
- Gain practical knowledge in using security testing techniques and tools
- Stay informed about recent vulnerabilities across different platforms, frameworks, and libraries
- Receive sources and further readings on secure coding practices
Audience
Developers, Testers
FreeIPA for Administrators
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.