Technical Training

Empower Your Technical Teams with Advanced Cyber Security Skills.

Through cybersecurity training, they acquire the expertise necessary to identify and address vulnerabilities in organizational systems and applications, thereby minimizing the likelihood of cyber-attacks and data breaches.

Training Objective

Cyber threats are ever-evolving, demanding technical teams to remain vigilant. With attackers constantly innovating tactics, technical teams play a pivotal role in defending against emerging risks. Through cybersecurity training, they acquire the expertise necessary to identify and address vulnerabilities in organizational systems and applications, thereby minimizing the likelihood of cyber-attacks and data breaches.

Training Outline

Web Application Security
  • Introduction to web application security
  • OWASP TOP 10 Security protocols
  • Passive and active reconnaissance of web applications
  • Exploitation of web applications (APHRC Tech Stack)
  • Secure coding practices for developers
  • Labs and tools transfer
  • Introduction to mobile application security
  • Penetration testing using SADT vs DAST testing methodology
  • Application security best practices
  • Secure coding practices for developers
  • Tools transfer
  • API penetration testing (Mobile and Web Application)
  • API security best practices
  • Cloud security fundamentals
  • Cloud security in DevSecOps
  • Cloud security for containers
  • Cloud security monitoring and logging
  • Cloud security auditing and compliance
  • Identity and access management (IAM)
  • Penetration testing of cloud environments
  • Introduction to Threat Intelligence
  • Introduction to Threat Modeling
  • Security Orchestration and Automation
  • Incident response and threat mitigation for cybersecurity teams
  • Building and Operating a Security Operations Center
  • Threat hunting
  • Information Gathering
  • Detection & Hardening against Payload Delivery & Execution
  • Detection & Hardening against Exploitation
  • Detection & Hardening against Persistence
  • Detection against Command & Control
  • Detecting & Hardening against Lateral Movement
  • Building a proactive defense architecture

This training program is meant for

Benefits

Training Outcome

Strengthen your defenses

Interested in bolstering your cybersecurity preparedness? Fortify your organization against cyber threats today.