Executive Cyber Security Awareness Training Course
This course offers leaders and managers a comprehensive overview of the issues and activities associated with cybersecurity.
Leaders will receive information on various topics that will build their knowledge and hone executive decision-making in regard to the cybersecurity threat.
By the end of this training, participants will be able to:
- Understand the Internet, social network Privacy
- Know PII and why it is important
- Know how to secure the Online Activates
- Know how to maintain the Privacy of business users
- Know more of the Cyber laws that protect the Privacy
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction
Threat Actors and Their Motivation
- Cybercriminals
- Script kiddies
- State-sponsored hackers
- Hacktivists
- Insiders
- Researchers / white hackers
Types of Cyber Attacks
- Ransomware
- DDOS
- APT
Tactics and Techniques
- Phishing, vishing, smishing
- Malicious devices
- Physical security
- Brute force/password spray
- APT attacks
Cyber Resilience Strategy
- MITRE ATT&CK
- Defense-in-depth
- Security monitoring
- Disaster recovery
Personal Security
- Passwords security and multifactor authentication
- Darknet monitoring
- Secure Internet connection
- Data encryption
- Secure email
- Mobile security
Summary and Next Steps
Requirements
Basics of computer use
Basics of internet and email use
Open Training Courses require 5+ participants.
Executive Cyber Security Awareness Training Course - Booking
Executive Cyber Security Awareness Training Course - Enquiry
Executive Cyber Security Awareness - Consultancy Enquiry
Testimonials (1)
I enjoyed refreshing my knowledge on the various subjects on cyber security. I was increasingly interested around cyber attacks, how they happen and what we (as an organisation) could potentially do to try and mitigate any risks. I did raise a question around AI in cyber attacks, and the answer was very in depth and interesting with a live example given on the spot.
Siobhan
Course - Executive Cyber Security Awareness
Upcoming Courses
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in India (available online or onsite) is designed for system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
By the end of this training, participants will be able to:
- Install and configure the 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in India (online or onsite) is designed for system administrators who wish to utilize Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Deploy and configure Active Directory.
- Establish a domain and define access permissions for users and devices.
- Administer users and machines using Group Policies.
- Regulate access to file servers.
- Set up Certificate Services and manage certificates.
- Deploy and manage services including encryption, certificates, and authentication.
Applications Security Foundation
21 HoursThis course addresses the essential secure coding practices pertinent to a broad spectrum of web application developers. Participants will learn the principles of secure programming by examining specific code snippets, identifying security vulnerabilities, and implementing effective remediation strategies.
Throughout this training, you will observe demonstrations of real-world attack scenarios and learn how to counter them, thereby building confidence in enhancing the security posture of your applications.
Duration: 3 days
Target Audience: Developers seeking to deepen their expertise in secure coding.
Learning Outcomes
• Upon completion, participants will gain knowledge in:
• Web Application Security.
• Common Web Application Risks.
• Penetration Testing on Demo Web Applications.
• Data Validation.
• Authentication.
• Session Management.
• Secure SDLC.
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. While it offers a wide array of security features to facilitate the development of secure software, it also lacks certain security measures found in other handheld platforms. This course provides a comprehensive overview of these features, highlighting critical shortcomings related to the underlying Linux system, the file system, and the general environment. It also addresses issues concerning the use of permissions and other Android software development components.
The course describes common security pitfalls and vulnerabilities for both native code and Java applications, offering recommendations and best practices to avoid and mitigate them. Many discussed issues are supported by real-life examples and case studies. Finally, we provide a brief overview on using security testing tools to uncover security-related programming bugs.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about Android's security solutions
- Learn to utilize various security features of the Android platform
- Gain information on recent Java vulnerabilities on Android
- Learn about typical coding mistakes and how to avoid them
- Gain an understanding of native code vulnerabilities on Android
- Realize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their weaknesses
- Access sources and further reading on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursBuilding secure networked applications can be challenging, even for developers who have previously worked with cryptographic building blocks like encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, this course first establishes a strong foundation on the core requirements of secure communication—such as secure acknowledgement, integrity, confidentiality, remote identification, and anonymity. It also highlights common issues that can compromise these requirements and presents practical real-world solutions.
Since cryptography is a critical component of network security, the course covers essential cryptographic algorithms, including symmetric cryptography, hashing, asymmetric cryptography, and key agreement protocols. Rather than focusing on complex mathematical theories, these concepts are explored from a developer's perspective, featuring typical use-case examples and practical considerations related to cryptographic implementation, such as Public Key Infrastructures (PKI). The course also introduces security protocols used in various areas of secure communication, providing an in-depth look at widely adopted protocol families like IPSEC and SSL/TLS.
Common cryptographic vulnerabilities are discussed, covering both specific algorithms and protocols. This includes attacks such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding Oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each vulnerability, the practical implications and potential consequences are explained, avoiding deep mathematical details to maintain focus on practical understanding.
Finally, given that XML technology is central to data exchange in networked applications, the course addresses XML security. This includes the use of XML within web services and SOAP messages, along with protective measures like XML Signature and XML Encryption. Additionally, it covers weaknesses in these protection mechanisms and XML-specific security issues, such as XML injection, XML External Entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Gain an understanding of fundamental security concepts, IT security, and secure coding practices
- Comprehend the requirements for secure communication
- Learn about network attacks and defenses across different OSI layers
- Develop a practical understanding of cryptography
- Understand essential security protocols
- Recognize recent attacks targeting cryptosystems
- Gain insights into recent related vulnerabilities
- Understand security concepts within Web services
- Access resources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursSpanning three days, this course introduces the fundamentals of safeguarding C/C++ code against malicious exploitation. It focuses on addressing vulnerabilities related to memory management and input handling, while exploring the core principles essential for writing secure code.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the diverse security services provided by Java, nor are they always conscious of the various vulnerabilities pertinent to web applications developed in Java.
Aside from introducing the security components of Standard Java Edition, this course addresses security concerns related to Java Enterprise Edition (JEE) and web services. The discussion of specific services builds upon the foundations of cryptography and secure communication. A range of exercises focuses on declarative and programmatic security techniques within JEE, while both transport-layer and end-to-end security for web services are explored. The application of all these components is illustrated through practical exercises, allowing participants to experiment with the discussed APIs and tools firsthand.
The course also examines and explains the most common and severe programming flaws associated with the Java language and platform, as well as web-related vulnerabilities. Beyond the typical errors made by Java developers, the covered security vulnerabilities include both language-specific issues and problems arising from the runtime environment. All vulnerabilities and their corresponding attacks are demonstrated through straightforward exercises, followed by recommended coding guidelines and potential mitigation techniques.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them
- Comprehend the security concepts underlying web services
- Acquire skills in utilizing various security features of the Java development environment
- Develop a practical understanding of cryptography
- Understand the security solutions offered by Java EE
- Learn about typical coding mistakes and how to avoid them
- Gain insights into recent vulnerabilities within the Java framework
- Acquire practical knowledge in using security testing tools
- Obtain resources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security: Secure Coding & Development Practices
14 HoursDescription
Although the Java language and the Runtime Environment (JRE) were designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++, software developers and architects must do more than just use the various security features of the Java environment (positive security). They must also be aware of the numerous vulnerabilities that are still relevant for Java development (negative security).
The introduction of security services is preceded by a brief overview of the foundations of cryptography, providing a common baseline for understanding the purpose and the operation of the applicable components. The use of these components is presented through several practical exercises, where participants can try out the discussed APIs for themselves.
The course also goes through and explains the most frequent and severe programming flaws of the Java language and platform, covering both the typical bugs committed by Java programmers and the language- and environment-specific issues. All vulnerabilities and the relevant attacks are demonstrated through easy-to-understand exercises, followed by the recommended coding guidelines and the possible mitigation techniques.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them
- Learn to use various security features of the Java development environment
- Have a practical understanding of cryptography
- Learn about typical coding mistakes and how to avoid them
- Get information about some recent vulnerabilities in the Java framework
- Get sources and further readings on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, numerous programming languages enable code compilation for the .NET and ASP.NET frameworks. While this environment offers robust security development capabilities, developers must master architecture-level and coding-level techniques to implement desired security features, avoid vulnerabilities, and limit their potential exploitation.
This course aims to equip developers with practical skills through extensive hands-on exercises. Participants will learn to prevent untrusted code from executing privileged actions, safeguard resources using strong authentication and authorization mechanisms, manage remote procedure calls and sessions, and explore various implementation strategies for enhanced security.
The course begins by introducing various vulnerabilities, starting with common programming pitfalls in .NET. It then examines ASP.NET-specific vulnerabilities, including the impact of different environment settings. Furthermore, the discussion covers general web application security challenges alongside specialized issues and attack vectors, such as ViewState manipulation and string termination attacks.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding principles
- Identify web vulnerabilities beyond the OWASP Top Ten and understand prevention strategies
- Utilize the security features available in the .NET development environment
- Acquire practical expertise in employing security testing tools
- Recognize typical coding errors and learn how to sidestep them
- Gain insights into recent vulnerabilities affecting .NET and ASP.NET
- Access resources and further reading materials on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led live training in India (online or onsite) is designed for system administrators who wish to use FreeIPA to centralize authentication, authorization, and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI, and RPC interface to set up and manage permissions.
- Enable Single Sign-On authentication across all systems, services, and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate, and migrate a FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led live training, conducted India (online or onsite), is targeted at system administrators who wish to implement Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security with multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in India (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in India (online or onsite) is designed for system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Establish the required server environment to begin configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service capabilities for web applications.
- Leverage federation services (such as OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across various systems or applications.
- Access and manage authentication, authorization, and identity services via REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in India (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.