Strategic Security Management

Cyber security has become highly focused domain for enterprises of all size, large organizations however have more at stake. There is a growing need to strategically manage technical as well as organizational cyber security initiatives

What is Strategic Security Management?

The Strategic Cyber Security Management workshop is a full day advanced instructor-led training course which is specially designed for corporates with decent level of maturely in their Cyber Security Program. This course is a good balance between highly technical aspects of cyber security as well as framework which are required to manage all aspects of cyber security in an organization.
The course is specifically crafted to demonstrate full attack lifecycle – initial breach to full active directory compromise. We’ll cover how from initial infection hackers move laterally within the network and dump all contents of active directory via domain admin compromise. Further, course will also focus on how to use opensource technology to detect the attack cycle.
Course will also focus on ISO 27001:2013 framework and incident response process which an organization can use to strengthen its cyber security practices

Real World Benefits

Initial shell that hackers get to ISO 27001 compliance, this course cover the entire stretch of cyber security. Course will help technical professionals to gain understanding of compliance and compliance professionals will get clear technical understanding – result better collaboration with each other

Target Audience

This course is intended for corporate IT teams responsible for managing and maintaining cyber security and technology departments. Following roles will benefit from the course

  • CIOs/CISOs
  • IT Managers
  • Systems Administrator
  • Network Administrators
  • Information Security Professionals

SecureRapid

At Course Completion

  1. Lateral Movement: Phishing to Active Directory
  2. Detecting Lateral Movement – Using free opensource technology
  3. Centralized SIEM solution Commercial vs Opensource
  4. Red Team vs Blue Team
  5. ISO 27001 Framework Overview
  6. Incident Response Plan

Are You Ready for the Challenge?

Sign Up