ADP I - Active Defense Training with EC-Council
Energy Capital LLP
Active Defense Training I
Course Outline
PRICE for THREE PARTICIPANTS (CEO/CISO/CxO) includes Certification Club from EC-Council.
1 Year access to curriculum, labs, and IaaS
3 EC-Council Certification qualifications
DAY 1 Security Operations Essentials
Computer Network and Security Fundamentals
Fundamentals of Cyber Threats
Introduction to Security Operations Center
SOC Components and Architecture
Introduction to Log Management
Incident Detection and Analysis
Threat Intelligence and Hunting
Incident Response and Handling
DAY 2 Cloud Security
Introduction to Cloud Security
Cloud Platform and Infrastructure Security in Cloud
Application Security in Cloud
Data Security in Cloud
Security Operations in Cloud
Cloud Penetration Testing in Cloud
Incident Response in Cloud
Forensic Investigation in Cloud
Business Continuity and Disaster Recovery in Cloud
Governance, Risk Management, and Compliance (GRC) in Cloud
Standards, Policies, and Legal Issues in Cloud
DAY 3 Ethical Hacking Cloud Infrastructure and IaaS
Learn the fundamentals of cloud computing and security. Encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.
Explore identity and access management in the cloud.
Learn about data protection and encryption in the cloud.
Gain knowledge of network security in cloud environments.
Dive deep into application security in cloud environments.
Gain insights on cloud security monitoring and incident response.
Explore cloud security risk assessment and management.
Understand the basics of cloud compliance and governance.
EVENT 6-9pm - Executive mixer at the Energy Capital Patio
Meet professionals in Cyber, AI, IaaS and more at an exclusive event for executives
DAY 4 Risk Management in IaaS
Introduction to Risk Management
The Essentials of a Risk Management Program
Risk Management Frameworks
Risk Management Policies and Procedures
Risk-Based Audits
Third-Party Risk Management (TPRM)
Risk Management Positions
Risk Law
Procurement Risk Management
Risk Culture
Future of Risk Manageme
Information Security Controls
Compliance Management
FISMA
GDPR
FFIEC
ISO Family of Standards
PCI DSS
NIST Special Publications
Audit Management
Audit Expectations and Outcomes
ISO/IEC Audit Guidance
Internal versus External Audits
Partnering with the Audit Organization
Compliance-Based Audits
Risk-Based Audits
Managing and Protecting Audit Documentation
Evaluating Audit Results and Report
Remediating Audit Findings
Leverage GRC Software to Support Audits
DAY 5 Infosec for Execs
Network Security
Assessments and Planning
Architecture Challenges
Design
Network Standards, Protocols, and Controls
Certified Chief
Network Security Controls
Wireless (Wi-Fi) Security
Wireless Risks
Wireless Controls
Voice over IP Security
Endpoint Protection
Threats
Vulnerabilities
End User Security Awareness
Endpoint Device Hardening
Endpoint Device Logging
Mobile Device Security
Mobile Device Risks
Mobile Device Security Controls
Internet of Things Security (IoT)
Protecting IoT Devices
Application Security
Secure SDLC Model
Secure Coding Practices
Separation of Development, Test, and Production Environments
Application Security Testing Approaches
DevSecOps
Waterfall Methodology and Security
Agile Methodology and Security
Application Hardening
Application Security Technologies
Version Control and Patch Management
Database Security
Database Hardening
Encryption Technologies
Encryption and Decryption
Cryptosystems
Blockchain
Digital Signatures and Certificates
PKI
Key Management
Encryption Strategy Development
Determining Critical Data Location and Type
Deciding What to Encrypt
Determining Encryption Requirements
Selecting, Integrating, and Managing Encryption Technologies
Cloud Computing Security
Overview of Cloud Computing
Security and Resiliency Cloud Services
Cloud Security Concerns
Cloud Security Controls
Cloud Computing Protection Considerations
Disruptive Technologies
Artificial Intelligence
Autonomous SOC
Dynamic Deception
Software-Defined Cybersecurity
Energy Capital LLP
Active Defense Training I
Course Outline
PRICE for THREE PARTICIPANTS (CEO/CISO/CxO) includes Certification Club from EC-Council.
1 Year access to curriculum, labs, and IaaS
3 EC-Council Certification qualifications
DAY 1 Security Operations Essentials
Computer Network and Security Fundamentals
Fundamentals of Cyber Threats
Introduction to Security Operations Center
SOC Components and Architecture
Introduction to Log Management
Incident Detection and Analysis
Threat Intelligence and Hunting
Incident Response and Handling
DAY 2 Cloud Security
Introduction to Cloud Security
Cloud Platform and Infrastructure Security in Cloud
Application Security in Cloud
Data Security in Cloud
Security Operations in Cloud
Cloud Penetration Testing in Cloud
Incident Response in Cloud
Forensic Investigation in Cloud
Business Continuity and Disaster Recovery in Cloud
Governance, Risk Management, and Compliance (GRC) in Cloud
Standards, Policies, and Legal Issues in Cloud
DAY 3 Ethical Hacking Cloud Infrastructure and IaaS
Learn the fundamentals of cloud computing and security. Encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.
Explore identity and access management in the cloud.
Learn about data protection and encryption in the cloud.
Gain knowledge of network security in cloud environments.
Dive deep into application security in cloud environments.
Gain insights on cloud security monitoring and incident response.
Explore cloud security risk assessment and management.
Understand the basics of cloud compliance and governance.
EVENT 6-9pm - Executive mixer at the Energy Capital Patio
Meet professionals in Cyber, AI, IaaS and more at an exclusive event for executives
DAY 4 Risk Management in IaaS
Introduction to Risk Management
The Essentials of a Risk Management Program
Risk Management Frameworks
Risk Management Policies and Procedures
Risk-Based Audits
Third-Party Risk Management (TPRM)
Risk Management Positions
Risk Law
Procurement Risk Management
Risk Culture
Future of Risk Manageme
Information Security Controls
Compliance Management
FISMA
GDPR
FFIEC
ISO Family of Standards
PCI DSS
NIST Special Publications
Audit Management
Audit Expectations and Outcomes
ISO/IEC Audit Guidance
Internal versus External Audits
Partnering with the Audit Organization
Compliance-Based Audits
Risk-Based Audits
Managing and Protecting Audit Documentation
Evaluating Audit Results and Report
Remediating Audit Findings
Leverage GRC Software to Support Audits
DAY 5 Infosec for Execs
Network Security
Assessments and Planning
Architecture Challenges
Design
Network Standards, Protocols, and Controls
Certified Chief
Network Security Controls
Wireless (Wi-Fi) Security
Wireless Risks
Wireless Controls
Voice over IP Security
Endpoint Protection
Threats
Vulnerabilities
End User Security Awareness
Endpoint Device Hardening
Endpoint Device Logging
Mobile Device Security
Mobile Device Risks
Mobile Device Security Controls
Internet of Things Security (IoT)
Protecting IoT Devices
Application Security
Secure SDLC Model
Secure Coding Practices
Separation of Development, Test, and Production Environments
Application Security Testing Approaches
DevSecOps
Waterfall Methodology and Security
Agile Methodology and Security
Application Hardening
Application Security Technologies
Version Control and Patch Management
Database Security
Database Hardening
Encryption Technologies
Encryption and Decryption
Cryptosystems
Blockchain
Digital Signatures and Certificates
PKI
Key Management
Encryption Strategy Development
Determining Critical Data Location and Type
Deciding What to Encrypt
Determining Encryption Requirements
Selecting, Integrating, and Managing Encryption Technologies
Cloud Computing Security
Overview of Cloud Computing
Security and Resiliency Cloud Services
Cloud Security Concerns
Cloud Security Controls
Cloud Computing Protection Considerations
Disruptive Technologies
Artificial Intelligence
Autonomous SOC
Dynamic Deception
Software-Defined Cybersecurity
Energy Capital LLP
Active Defense Training I
Course Outline
PRICE for THREE PARTICIPANTS (CEO/CISO/CxO) includes Certification Club from EC-Council.
1 Year access to curriculum, labs, and IaaS
3 EC-Council Certification qualifications
DAY 1 Security Operations Essentials
Computer Network and Security Fundamentals
Fundamentals of Cyber Threats
Introduction to Security Operations Center
SOC Components and Architecture
Introduction to Log Management
Incident Detection and Analysis
Threat Intelligence and Hunting
Incident Response and Handling
DAY 2 Cloud Security
Introduction to Cloud Security
Cloud Platform and Infrastructure Security in Cloud
Application Security in Cloud
Data Security in Cloud
Security Operations in Cloud
Cloud Penetration Testing in Cloud
Incident Response in Cloud
Forensic Investigation in Cloud
Business Continuity and Disaster Recovery in Cloud
Governance, Risk Management, and Compliance (GRC) in Cloud
Standards, Policies, and Legal Issues in Cloud
DAY 3 Ethical Hacking Cloud Infrastructure and IaaS
Learn the fundamentals of cloud computing and security. Encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.
Explore identity and access management in the cloud.
Learn about data protection and encryption in the cloud.
Gain knowledge of network security in cloud environments.
Dive deep into application security in cloud environments.
Gain insights on cloud security monitoring and incident response.
Explore cloud security risk assessment and management.
Understand the basics of cloud compliance and governance.
EVENT 6-9pm - Executive mixer at the Energy Capital Patio
Meet professionals in Cyber, AI, IaaS and more at an exclusive event for executives
DAY 4 Risk Management in IaaS
Introduction to Risk Management
The Essentials of a Risk Management Program
Risk Management Frameworks
Risk Management Policies and Procedures
Risk-Based Audits
Third-Party Risk Management (TPRM)
Risk Management Positions
Risk Law
Procurement Risk Management
Risk Culture
Future of Risk Manageme
Information Security Controls
Compliance Management
FISMA
GDPR
FFIEC
ISO Family of Standards
PCI DSS
NIST Special Publications
Audit Management
Audit Expectations and Outcomes
ISO/IEC Audit Guidance
Internal versus External Audits
Partnering with the Audit Organization
Compliance-Based Audits
Risk-Based Audits
Managing and Protecting Audit Documentation
Evaluating Audit Results and Report
Remediating Audit Findings
Leverage GRC Software to Support Audits
DAY 5 Infosec for Execs
Network Security
Assessments and Planning
Architecture Challenges
Design
Network Standards, Protocols, and Controls
Certified Chief
Network Security Controls
Wireless (Wi-Fi) Security
Wireless Risks
Wireless Controls
Voice over IP Security
Endpoint Protection
Threats
Vulnerabilities
End User Security Awareness
Endpoint Device Hardening
Endpoint Device Logging
Mobile Device Security
Mobile Device Risks
Mobile Device Security Controls
Internet of Things Security (IoT)
Protecting IoT Devices
Application Security
Secure SDLC Model
Secure Coding Practices
Separation of Development, Test, and Production Environments
Application Security Testing Approaches
DevSecOps
Waterfall Methodology and Security
Agile Methodology and Security
Application Hardening
Application Security Technologies
Version Control and Patch Management
Database Security
Database Hardening
Encryption Technologies
Encryption and Decryption
Cryptosystems
Blockchain
Digital Signatures and Certificates
PKI
Key Management
Encryption Strategy Development
Determining Critical Data Location and Type
Deciding What to Encrypt
Determining Encryption Requirements
Selecting, Integrating, and Managing Encryption Technologies
Cloud Computing Security
Overview of Cloud Computing
Security and Resiliency Cloud Services
Cloud Security Concerns
Cloud Security Controls
Cloud Computing Protection Considerations
Disruptive Technologies
Artificial Intelligence
Autonomous SOC
Dynamic Deception
Software-Defined Cybersecurity