Technical Training
Empower Your Technical Teams with Advanced Cyber Security Skills.
Through cybersecurity training, they acquire the expertise necessary to identify and address vulnerabilities in organizational systems and applications, thereby minimizing the likelihood of cyber-attacks and data breaches.
- Duration: 3 hrs; 3 days per week
- Mode of Delivery: Physically/ Virtually via Teams/Zoom
Training Objective
Cyber threats are ever-evolving, demanding technical teams to remain vigilant. With attackers constantly innovating tactics, technical teams play a pivotal role in defending against emerging risks. Through cybersecurity training, they acquire the expertise necessary to identify and address vulnerabilities in organizational systems and applications, thereby minimizing the likelihood of cyber-attacks and data breaches.
Training Outline
Web Application Security
- Introduction to web application security
- OWASP TOP 10 Security protocols
- Passive and active reconnaissance of web applications
- Exploitation of web applications (APHRC Tech Stack)
- Secure coding practices for developers
- Labs and tools transfer
Mobile Security
- Introduction to mobile application security
- Penetration testing using SADT vs DAST testing methodology
- Application security best practices
- Secure coding practices for developers
- Tools transfer
API Security
- API penetration testing (Mobile and Web Application)
- API security best practices
Cloud and architecture security
- Cloud security fundamentals
- Cloud security in DevSecOps
- Cloud security for containers
- Cloud security monitoring and logging
- Cloud security auditing and compliance
- Identity and access management (IAM)
- Penetration testing of cloud environments
Threat Intelligence
- Introduction to Threat Intelligence
- Introduction to Threat Modeling
- Security Orchestration and Automation
- Incident response and threat mitigation for cybersecurity teams
- Building and Operating a Security Operations Center
- Threat hunting
Advanced Security Architecting & Defense
- Information Gathering
- Detection & Hardening against Payload Delivery & Execution
- Detection & Hardening against Exploitation
- Detection & Hardening against Persistence
- Detection against Command & Control
- Detecting & Hardening against Lateral Movement
- Building a proactive defense architecture
This training program is meant for
- System Administrators
- Network Engineers
- Software Developers
- DevSecOps & DevOps Engineers
- Security Analysts
- IT Support
- Security Architects
- Incident Responders
- Compliance Auditors / Officers
Benefits
- Improve understanding of security setups, best practices, and threat response.
- Learn network security protocols, encryption, and defense against cyber threats.
- Master secure coding, vulnerability assessment, and threat modeling.
- Deepen knowledge of threat actors, detection, and incident response.
- Acquire incident recognition, troubleshooting, and support skills.
- Hone penetration testing, exploit identification, and security posture improvement.
- Understand secure IT architecture, defense strategies, and compliance.
- Enhance incident response skills, from triage to recovery.
- Improve security event monitoring, threat detection, and real-time response.
- Gain insights into regulatory compliance, data protection, and security controls.
Training Outcome
- Proficiency in identifying and mitigating common web application vulnerabilities outlined in OWASP TOP 10.
- Mastery in secure coding practices to prevent exploitation of web applications.
- Competence in conducting penetration testing and applying security best practices for mobile applications.
- Expertise in API security testing and implementing API security measures.
- Comprehensive understanding of cloud security fundamentals, DevSecOps practices, and container security.
- Ability to perform penetration testing on cloud environments and manage cloud configurations securely.
- Proficiency in leveraging threat intelligence for proactive threat detection and response.
- Competence in orchestrating and automating security processes to enhance efficiency and effectiveness.
- Skill in incident response and threat mitigation, including the establishment and operation of Security Operations Centers (SOCs).
- Capability to conduct threat hunting activities to proactively identify potential security threats.
- Understand how present-day attacks are executed and how they could have been disrupted.
- Implement security controls across your infrastructure based on attack frameworks to prevent, detect, and respond to attacks.
Strengthen your defenses
Interested in bolstering your cybersecurity preparedness? Fortify your organization against cyber threats today.