IT manager

Training Course: Certified Cyber Security Specialist


Register Now
Quick Inquiry
Discount Group Download Brochure (38)

IT234569

1 - 5 Jun 2025

Dubai (UAE)

Cost : 4565 € Euro

Introduction

This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cybersecurity to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking, and black hat hacking.

It will also cover WiFi security, Website security, human factors, cyber forensics, cybersecurity team management, Secure Operations Center (SOC), and Computer Security Incident Response Team (CSIRT) infrastructures.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.  All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations.

Course Methodology of Certified Cyber Security Specialist

The course will include practical sessions, videos as well as live examples [e.g. Virus] and demonstrations of white and black hat hacking tools. All participants will also be provided with the latest research papers and articles.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.

Course Objectives of Certified Cyber Security Specialist

By the end of the course, participants will be able to:

  • Apply information security standards to their organization and its critical assets
  • Identify the threats presented by viruses, malware, active code, and Active Persistent Threats (APT) and consider the different mitigating options
  • Formulate and manage effective cybersecurity teams, and apply the Computer Security Incident Response Team (CSIRT) framework, tools, and capabilities to deliver cost-effective and robust solutions to protect the organization
  • Use Neuro-Linguistic Programing (NLP) to deliver messages that will change the way employees work and think about security
  • Examine the area of wireless security protocols, their security attributes, and their potential insecurities within the organization, and in public spaces
  • Illustrate how penetration testing and ethical hacking enhance organizational security
  • Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

Target Audience of Certified Cyber Security Specialist

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.

Target Competencies of Certified Cyber Security Specialist

  • Information security management
  • Vulnerability assessment and management
  • Applying cyber security solutions
  • Developing IT policies and procedures
  • Cyber forensics
  • Ethical hacking and Black Hat hacking

Course Outline of Certified Cyber Security Specialist

Day 1:

  • Adapting to evolving standards
    • Information security standards (e.g. PCI-DSS/ISO27001)
    • Documented tools:
      • ISO/IEC 27001
      • PAS 555
      • Control Objectives for Information and Related Technology (COBIT)
    • Future standards
      • ISO/IEC 2018
      • EU privacy regulations
      • Local and international government stipulations implicating access to private data

Day 2:

  • Principles of IT security
    • Enterprise security
      • External defenses
      • Web filtering
      • Intruder Prevention Systems (IPS)
      • Intruder Detection Systems (IDS)
      • Firewalls
    • Secure code
    • Software Development Lifecycles (SDL)
    • Potential insecurities within developed applications
    • WiFi security protocols and attributes
    • Voice over IP (VoIP) security
    • Governance Risk and Compliance (GRC)
    • Security Incident Event Management (SEIM) applications
    • Cloud security
    • Third-party security and compliance

Day 3:

  • Adopting cybersecurity measures
    • Employee perception of security through Neuro-Linguistic Programing (NLP)
    • Security education and awareness: techniques, systems, and methodologies
    • Penetration testing
    • Ethical hacking
    • Options to mitigate viruses, malware, active code threats and Active Persistent Threats (APT)
    • The Computer Incident Response Team (CSIRT) frameworks, tools, and capabilities
    • Incident first response: proven methodologies, tools, and systems
    • The science of applying robust digital forensics: applicable law, capabilities, and methodologies
    • Supervisory Controls and Data Acquisition (SCADA); security requirements, processes, and methodologies
    • Abuse images: complying with local and international law

Day 4:

  • Building cybersecurity teams
    • Creation and management of a Secure Operations Center (SOC)
    • Development of the Corporate Security Organization Framework
    • Formulation and deployment of a Computer Security Incident Response Team (CSIRT)
    • Bespoke Security Incident and Event System (SIEM) for the operational deployment
    • Risks associated with I/O Security (e.g. USBs, CDs, other forms of media)
    • Risks of Active Code Injection, and mitigation techniques

Day 5:

  • Advanced cyber risks and tools
    • Cybercrime and the darknet/dark web: the world of the hackers/hacktivists
    • The underground of cyber criminality
    • Social engineering as a tool to test operational resilience
    • Open Source Intelligence (OSINT)
    • Cyber threat intelligence
    • Open source and commercial security tools
    • The operational use of encryption
    • Virtual private networks
  • Steganography - Techniques used to hide hacking tools and malware on networks
    • Command-line and tools used to identify and extract dangerous files and contain malware and hacking applications
    • The 1-10-60 Rule to identify and contain dangerous hidden applications
    • Alternate Data Streams (ADS) and the threats they can pose under an NTFS environment
    • Leveraging ADS to hide undetectable malware within an operational network

IT manager

Training Course: Certified Cyber Security Specialist


Register Now
Quick Inquiry
Discount Group Download Brochure (38)

IT234569

1 - 5 Jun 2025

Dubai (UAE) -

Cost: 4565 € Euro


  About Dubai

Dubai, located on the Persian Gulf, is one of the seven United Arab Emirates and one of the most popular tourist destinations in the world. The discovery of oil in the region has made Dubai extremely wealthy, allowing it to build the glittering skyscrapers that it is now famous for. That wealth is strongly in evidence in Dubai and visitors will see luxurious buildings and supercars aplenty. Perfect beaches and endless shopping opportunities are to key to Dubai's attractions. Flights to Dubai open up the city's cultural attractions to tourists, with beautiful mosques, museums and art galleries scattered throughout this ultra-modern metropolis.


  Things to do and places to visit in Dubai

Dubai's wealth has made it famous for building ever taller buildings and creating artificial islands off its shores. The city's hotels are luxurious and shoppers will love its extensive shopping malls which showcase all the world's top brands. Dubai's attractions don't end there. Dubai also caters to adventure lovers, who can jump in a 4x4 or on a board to speed over dunes outside the city. Local culture mustn't be forgotten either, and visitors have wonderful mosques to visit and old districts to explore. All that combined means that a flight to Dubai is sure to lead to an unforgettable holiday.

When visiting Dubai, be sure to:

  • Go to the observation deck of the Burj Khalifa, the tallest building in the world.
  • Admire the intricately beautiful Grand Mosque, which has the tallest minaret in the city.
  • Understand the local history and culture with a visit to the Dubai Museum.
  • Discover objects from the 6th century at Jumeirah Archaeological Site.
  • Go skiing – That's not a joke, the Mall of the Emirates houses a snowdome.
  • Go shopping at the Mall of the Emirates or the Dubai Mall.
  • Explore the desert surrounding the city – either by 4x4 or atop a camel.
  • Eat fantastic seafood at Dubai Marina.
  • Cool off at the Wild Wadi Waterpark.
  • Marvel at gorgeous Arabic calligraphy at Jumeirah Mosque, the biggest in the city.
  • Take a yacht tour around the artificial islands of Palm Jumeirah.
  • Haggle for souvenirs in one of the city's souks.
  • Wander around the traditional building in Bastakiya District.
 22 Portman Square, Marylebone, London W1H 7BG, UK
 3 Oudai street, Aldouki, Giza, Giza Governorate, Egypt
 0020233379764
 00201095004484
 00201102960555
 00201102960666
 19 Mayıs Mahallesi, 19 Mayis Street No 2 Sisli, 34360 Istanbul/Turkey
 00905357839460
 Australia Street, Raouche Beirut, Lebanon .، Beirut, Lebanon
 0096181746278
 811 Massachusetts Avenue, Boston, Massachusetts, 02118, USA
 6 Beirut Street - Fifth Circle Abdoun, P.O. Box 831370, 11183 Amman, Jordan
Copyright Global Horizon Training Center © 2019