Our Incident Response Planning and Preparation Training course will usually be hosted remotely and introduce IT team members to the essential processes and best practices for effectively responding to potential and likely cybersecurity attacks.
The training includes interactive presentations that provide an overview of the response process in the context of real-world examples of organisations facing cybersecurity attacks.
By the end of this training, participants will be able to:
The focus of this training course is the “Actions On” a realistic cyber-attack, starting with a solid foundation of the work the organisation should do prior to an attack being detected (“Preparation”), to an incident being detected (“Plan Execution”), right up to the incident recovery being completed and the organisation closing the incident (“Lessons Learned”).
Our training course is technical in nature and is intended for the following team members:
This course is ideal for IT professionals looking to reinforce their foundational knowledge, stay ahead of evolving threats, and proactively secure their organisation’s critical infrastructure against attacks.
We cover the following sections throughout the session:
Preparation
Identification
Containment
Recovery
Lessons Learned
Raise cybersecurity awareness within your organisation.
Up-skill your technical teams on how to more effectively defend your systems.
Deploy and improve internal protections to defend against attacks.
Our workshops are tailored to your organisations needs and interests. Previous workshops have included how organisations can recognise and detect threats, including both technical measures that can be put in place to detect and block them, as well as staff security awareness training.
Our speakers are experienced ethical hackers and can give first-hand examples of how different threats can be built and delivered, such as how attackers put together attacks and “What happens next” when a staff member falls for a social engineering scam.
Awareness Training can be a key part to reducing the risk of threats such as social engineering and phishing – but many companies struggle to put together effective security awareness training sessions. It’s an understandable problem though, putting together a talk about passwords and emails, but keeping it interesting, is ...
Our “Building and Breaking” series is ideal for those looking to break into cyber security as a career or develop their security testing skills. So whether you’re a software developer looking to build more secure applications, or wanting to become a penetration tester in the future – this course will ...
Our “Building and Breaking” series is ideal for those looking to break into cyber security as a career or develop their security testing skills. So whether you’re a system admin looking to build more secure networks, or wanting to become a penetration tester in the future – this course will ...
© 2024 Akimbo Core Ltd
Play | Cover | Release Label |
Track Title Track Authors |
Page | Buy | Delete |
---|