Training And Certification

Training And Certification

Training -Certification is the core Business Vertical of ‘Insight International’ in UK. The vision is to support IT Industry across domains as well as individuals to keep pace with the Technology and process change in the market.

Advanced Training On Cyber Security

5 Days – 3rd Dec to 7th Dec 2018
In Central London

For more details contact:

Pawan Prasad
+44 (0) 7960049477
Pawan@insightinc.co.uk

Mehak Bhatia
+44 (0) 2032395211
Mehak@insightinc.co.uk

Objective

  • Competency based Leadership development
  • Coaching and Mentoring
  • Reduce Operational Cost and increase the Productivity
  • Reduce ‘Time to Market’ of new product and services
  • Reduce Delivery Risk and improve Business Focus
  • Introduce Robust Governance model to manage large engagement

Since its foundation in 2014, Insight has become a leading provider of

  • IT solutions and services dedicated to serving its clients’ needs.
  • Catering the training needs on Niche IT Technologies–Cyber Security, Pega ( BPM, RPA), Big data ( Machine Learning, Natural Language processing)
  • Our Unique Attributes are as follows:

Skilled – At Insight, we have invested in skill improvement to provide the highest quality services to our clients.

Certified – Our technical staff are certified in the multi-vendor technologies to keep pace with today’s IT environments.

Reputable – Insight’s reputation as a leading provider of IT solutions has evolved through our ability to use IT strategically.

Committed – Insight is committed to deliver effective IT solutions using a strategic approach.

Effective We work with our clients to build effective relationships that lead to long-term strategic partnerships.

Our Training program on Cyber Security

  • We have successfully organized training programs in London along with our partners on Cyber Security.
  • We maintain training calendar to organize similar training program on Cyber Security.
  • We organize training program with Trainers who are duly qualified and having significant experience in Cyber Security.
  • Our trainers are accustomed to the culture of UK
  • Our trainers are completely aware of the market demand of IT Security skills in UK. They will address the Gaps between demand and supply of the Skills in IT Security throughout their training program.
  • There will be Hands-on Training sessions in the training curriculum.
  • The scheduled training will be In-person Class-room training in Central London with Breakfast, Lunch and Snacks facilities.
  • The training program will be of 5 days’ duration with 8 hours in each day and 1 hour break. The program will start at 09:00 AM and will finish at 05:00 PM in each day.
  • Charges for each participant will be 2000 GPB + VAT

The curriculum of our Cyber Security training on Day1

Sr.No.

Topic
09:00 AM- 05:00 PM

1

Welcome and Introductions

2

Course Aims, Objectives and Structure

3

ISACA Introduction to CISA Modules

4

Concepts of Auditing Information Systems, Governance and IT, Information acquisition and Development System, Operation Management and Support , Asset Protection

5

Key Tenets: CIA TRIAD, Types of Audits, Internal , External, Audit Standards, Ethical Audit Process

6

Reference Architecture of Enterprise Level Security Architecture On Premise and Cloud and foundational concepts

7

Security Domains, Roles, User groups, Tokens, Service Catalogues, LDAP, Role-Based Access Control (RBAC), Policy and Back ends, Services, Federated Identity

8

IT Governance

IT Steering Committee, Balanced Scorecards, Project Management, COBIT Principles, Executive Performance Review, organization and Management Control methods, Risk Management, System Life Cycle Management, Business Continuity, Business Process Re-Engineering ( BPR) Methodology , Principles, Goals and Techniques, IS as subset of BPR, BPR Tools and Data Management , BIA

9

Audit Process Objective, Roles, Responsibilities

10

Audit Charter, Program Implementation, Audit Quality Control

11

Audit Process and Risk Management

12

Evidence Collection, Evidence Life Cycle, Audit Tools

13

Report Findings, Closing Meetings

14

Case Study of a Successful Audit Program

15

Network Architecture Basics

16

Networking layered Models

17

Logical and Physical Network Design and Topologies

18

Network protocols: DHCP, DNS, LDAP, VPN, WLAN Security 802.11i, Intrusion System and Intrusion Protection System

19

Software as a Service (SaaS), Cloud Computing and Exposure to AWS

20

Network Management, Protocol Analyser, SNMP, Syslog, EMS

21

Lab Work 1 : Practical Demonstration and Lab work based on Wireshark, SSH Remote

22

Summary

Sr.No.

Topic
09:00 AM- 05:00 PM

1

Day 1 Review and Jeopardy Quiz

2

Information System Development Life Cycle, CMM, Agile Vs Waterfall

3

Data Architecture, Data Integrity, Decision Support AI and Data Analytics, Dev-Ops, Data Flow and Process Mapping

4

Data Protection Impact Assessment/Privacy Impact Assessment

5

Incident Handling and Response loop

6

Digital Forensics

7

Monitoring of Status of Controls, System Monitoring

8

Logical Access Controls and Physical Access Control

9

Media and Storage Handling

10

Data File Controls and Integrity Management

11

Application Processing Controls and Secure Coding Standards OWASP, OASIS Standards

12

Log Management and Dashboard Management

13

Lab Work 2 : Virtual Deployment and Monitoring of SIEM Tool Security Onion and Elastic Search, Log Stash and Kibana

14

Proactive vs Reactive Breach Protection Techniques

15

Monitoring, Measurement, Analysis and Evaluation and Immutability of Audit Logs

16

Lab Work 3 : OpenDLP Demonstration

17

Close for the Day

Sr.No.

Topic
09:00 AM- 05:00 PM

1

Day 2 Review Quiz Check

2

Asset Protection

3

Understanding the Threat Landscape and Anatomy of a Attack on Infrastructure, Cyber Kill Chain; Attack Vectors and Counter-Measures

4

Implementing Administrative and Technical Protective Controls; Taxonomy of Control Families

5

Application Software Controls, Authentication and Authorizations, Network Access Protection and Encryption Methods, PKI

6

Technical Security Testing: Black Hat, Grey Hat and White Hat Perspective

7

Anatomy of Attack on Mobile Phone and Attack Vectors

8

Data Lifecycle Principles of Privacy and Services

9

Expanding the CIA Triad to include Privacy; Data Leak Protection and Escape Channels

10

Case Study of Sony Data Leak

Sr.No.

Topic
09:00 AM- 05:00 PM

1

Day 3 Review Quiz Check

2

Phases of Business Continuity Plan Phases: Setting Up the BC Program, The Discovery Process, Plan Implementation, Maintenance and Integration

3

Understanding the Auditors Interests in BC/DR plans

4

Two Tier and 3 –Tier Architecture Reference Architecture for on-Premise

5

Transition from On-Premise to Cloud Based Deployment

6

Server Less Design, Containerization and Micro-Service Architecture and Challenges

7

Auditing Controls and Accountability Frameworks for Modern Cloud Native

8

Automation Tools in Dev-Ops: Chef, Puppet

9

Lab 4 : Amazon Web Services Based Demonstration Creation of VPC , ELB and Monitoring Infrastructure through Console and CLI Scripts

10

Summary of Key Takeaways

Sr. No.

Topic
09:00 AM- 05:00 PM

1

Day 4 Review Quiz Check

2

Integrating BYOD, Sensors, IoT, Gateways and Automation fast Changing Technology

3

Distributed Computing and Block chain Disruption

4

Challenges for Auditors for IS and Privacy Protection

5

Suggested Modern Day Auditor’s Toolkit

6

2 Hours Course Test and Evaluation

7

Feedback for Trainers and Course Closure


Drop us a line