Security Analyst Training Course
The intended audience includes network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals.
This course is available as onsite live training in United Arab Emirates or online live training.Course Outline
Core modules:
1. Need for Security Analysis
2. TCP IP Packet Analysis
3. Penetration Testing Methodologies
4. Customers and legal Agreements
5. Rules of Engagement
6. Penetration Testing Planning and Scheduling
7. Pre- Penetration Testing Steps
8. Information gathering
9. Vulnerability Analysis
10. External penetration Testing
11. Internal Network Pen Testing
12. Firewall Penetration Testing
13. IDS Penetration Testing
14. Password Cracking Penetration Testing
15. Social Engineering Penetration testing
16. Web Application Penetration Testing
17. SQL Penetration Testing
18. Penetration Testing Reports and Post Testing Actions
Additional Modules:
1. Router and Switches Penetration Testing
2. Wireless Network Penetration Testing
3. Denial-of-Service Penetration Testing
4. Stolen Laptop, PDAs and Cell Phones Penetration Testing
5. Source Code Penetration Testing
6. Physical Security Penetration Testing
7. Surveillance Camera Penetration Testing
8. Database Penetration Testing
9. VoIP Penetration Testing
10. VPN Penetration Testing
11. Cloud Penetration Testing
12. Virtual Machine Penetration Testing
13. War Dialling
14. Virus and Trojan Detection
15. Log Management Penetration Testing
16. File Integrity Checking
17. Mobile Devices Penetration Testing
18. Telecommunication and Broadband Communication Penetration Testing
19. Email Security Penetration Testing
20. Security Patches Penetration Testing
21. Data Leakage Penetration Testing
22. SAP Penetration Testing
23. Standards and Compliance
24. Information System Security Principles
25. Information System Incident and Response
26. Information System Auditing and Certification
Requirements
No Prerequisites required
Need help picking the right course?
Security Analyst Training Course - Enquiry
Testimonials (1)
Questions, that helps me a lot to understand the characteristics of CRISC examination.
Masakazu Yoshijima - Bank of Yokohama, Ltd.
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Certified Chief Information Security Officer (CCISO)
35 HoursThe EC-Council’s CCISO Program has certified top-tier information security professionals globally. A select group of senior information security executives, known as the CCISO Advisory Board, played a pivotal role in establishing the program's foundation and defining the exam content, body of knowledge, and training materials. Various board members contributed in different capacities—as authors, exam writers, quality assurance reviewers, or trainers. Each aspect of the program was crafted with aspiring CISOs in mind, aiming to impart the expertise of seasoned professionals to the next generation in critical areas for developing and sustaining a robust information security program.
The Certified CISO (CCISO) program is pioneering in its approach to training and certifying high-level information security executives. Unlike other programs that focus solely on technical skills, CCISO emphasizes the application of information security management principles from an executive perspective. This program was developed by current CISOs for both existing and aspiring CISOs.
CISA - Certified Information Systems Auditor
28 HoursDescription:
The CISA® certification is globally recognized as the most sought-after credential for professionals in IS auditing and IT risk consultancy.
Our CISA course is rigorous, competitive, and exam-focused. With over 150+ training sessions conducted across Europe and worldwide, and more than 1200+ delegates trained, Net Security's CISA materials are developed internally with the primary aim of ensuring that participants pass the ISACA CISA® Exam. The training approach emphasizes understanding CISA auditing concepts and practicing numerous question banks released by ISACA over the past three years. Over time, CISA holders have been highly sought after by leading accounting firms, global banks, advisory services, assurance teams, and internal audit departments.
Even with extensive experience in IT auditing, delegates' ability to tackle CISA questions will depend on their grasp of internationally accepted IT assurance practices. The exam is challenging due to the potential for closely competing answer choices, which tests candidates’ understanding of global IT auditing standards. To meet these challenges, we provide experienced trainers who have a proven track record in delivering CISA training globally.
The Net Security CISA manual encompasses all relevant concepts, case studies, and Q&A across the five CISA domains. Additionally, the trainer provides key supporting materials such as notes, question banks, glossaries, videos, revision documents, exam tips, and mind maps throughout the course.
Goal:
The primary objective is to successfully pass your CISA examination on the first attempt.
Objectives:
- Apply acquired knowledge in practical ways that benefit your organization
- Conduct audit services according to IT auditing standards
- Ensure assurance on leadership and organizational structure and processes
- Provide assurance on the acquisition, development, testing, and implementation of IT assets
- Offer assurance on IT operations including service operations and third-party engagements
- Guarantee the confidentiality, integrity, and availability of information assets through assurance on security policies, standards, procedures, and controls.
Target Audience:
This course is designed for finance/CPA professionals, IT specialists, internal & external auditors, information security experts, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 HoursThe training is delivered through a workshop enriched with comprehensive knowledge based on the official CISA certificate framework. During the sessions, case studies will be analyzed to address specific issues. Classes will be conducted in English (upon request, also available in Polish) using the ISACA handbook in English.
CISA Exam Material Scope:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development, and Implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Type: multiple choice test
Volume: 200 questions
List of requirements to claim the CISA qualification:
- Pass the CISA exam with a score of at least 450.
- Adhere to the ISACA Code of Professional Ethics.
- Pledge to follow the CISA Continuing Professional Education Policy.
- Achieve a minimum of five years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards.
If you have passed the exam and meet these requirements, you can start your certification application: apply here
A fee of $50 is required for this application.
Additionally, there’s an annual maintenance fee to keep the certification active. The cost is $40 per year for ISACA members and $75 for non-members.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course is designed for rigorous exam preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. It covers all four domains of the latest ISACA CRISC syllabus with a strong emphasis on the examination itself. Attendees will receive the Official ISACA CRISC Review Manual and Question, Answer and Explanation (Q,A&E), which are invaluable for understanding the style of questions posed by ISACA and the type of answers they seek, thereby aiding in quick mastery of the material.
The technical skills and practices endorsed and assessed through the CRISC certification form the foundation for success in this field. Holding a CRISC certification showcases your expertise within the profession. With an increasing demand for professionals skilled in risk management and control, ISACA’s CRISC has become the preferred certification globally among both individuals and enterprises. This certification reflects a dedication to excellence in serving enterprises and advancing one's chosen career.
Objectives:
- To ensure you pass the CRISC examination on your first attempt.
- Possessing this certification will demonstrate your commitment to excelling in service to an enterprise.
- The rising demand for professionals with risk and control skills positions holders of this certification to secure better roles and salaries.
You will learn:
- To assist enterprises in achieving their business goals by creating, implementing, monitoring, and maintaining effective IS controls based on a risk-based approach.
- The technical competencies and practices promoted through CRISC, which are essential for success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk and implementing information systems controls, and prepare for the CRISC certification exam.
By the end of this training, participants will be able to:
- Understand the governance and risk management aspects of IT.
- Conduct IT risk assessments and implement risk responses.
- Design and implement information systems controls.
- Prepare effectively for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at supply chain professionals who wish to establish effective control and oversight of their supply chain, especially as it relates to cybersecurity.
By the end of this training, participants will be able to:
- Understand the security oversights that can bring about significant damage and disruption to a supply chain.
- Break down a complex security problem into manageable and actionable parts.
- Address common supply chain vulnerabilities by analyzing high risk areas and engaging with stakeholders.
- Adopt best practices in securing a supply chain.
- Noticeably reduce or eliminate the biggest risks to an organization's supply chain.
Cyber Resilience RESILIA Foundation
14 HoursThe RESILIA course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities.
Data Breach Management
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level to advanced-level IT professionals and business leaders who wish to develop a structured approach to handling data breaches.
By the end of this training, participants will be able to:
- Understand the causes and consequences of data breaches.
- Develop and implement data breach prevention strategies.
- Establish an incident response plan to contain and mitigate breaches.
- Conduct forensic investigations and assess the impact of breaches.
- Comply with legal and regulatory requirements for breach notification.
- Recover from data breaches and strengthen security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Information Systems Auditor
35 HoursDescription:
This course serves as the non-certification variant of the "CISA - Certified Information Systems Auditor" program. CISA® is globally recognized and widely sought after by professionals engaged in IS auditing and IT risk consulting.
Objectives:
- Leverage acquired knowledge to enhance your organization's performance
- Deliver audit services that adhere to IT audit standards
- Ensure leadership, organizational structure, and processes are audited effectively
- Offer assurance on the acquisition, development, testing, and implementation of IT assets
- Provide oversight for IT operations, including service management and third-party engagements
- Assure that the organization's security policies, standards, procedures, and controls safeguard the confidentiality, integrity, and availability of information assets.
Target Audience:
The course is designed for finance/CPA professionals, IT specialists, internal and external auditors, information security experts, and risk consulting practitioners.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Securing Email with Cisco Email Security Appliance (SESA) v3.1
28 HoursThis class will help you:
- Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
- Gain leading-edge career skills focused on enterprise security
Objectives
After taking this course, you should be able to:
- Describe and administer the Cisco Email Security Appliance (ESA)
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters to enforce email policies
- Prevent data loss
- Perform LDAP queries
- Authenticate Simple Mail Transfer Protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarantines and delivery methods
- Perform centralized management using clusters
- Test and troubleshoot
Snyk
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course delves into fundamental security principles and IT security, focusing particularly on safeguarding networks from attacks. Attendees will acquire knowledge of crucial security protocols and the security aspects of web services. The curriculum也将提及针对加密系统的最近攻击及一些相关漏洞。 Note: The last sentence seems to be a mix of English and Chinese. Here is the fully English version:
This course delves into fundamental security principles and IT security, focusing particularly on safeguarding networks from attacks. Attendees will acquire knowledge of crucial security protocols and the security aspects of web services. The curriculum will also reference recent attacks on cryptosystems and some related vulnerabilities.