ADP I - Active Defense Training with EC-Council

$23,499.00


Energy Capital LLP

Active Defense Training I

Course Outline

PRICE for THREE PARTICIPANTS (CEO/CISO/CxO) includes Certification Club from EC-Council.

1 Year access to curriculum, labs, and IaaS

3 EC-Council Certification qualifications

DAY 1 Security Operations Essentials

  • Computer Network and Security Fundamentals

  • Fundamentals of Cyber Threats

  • Introduction to Security Operations Center

  • SOC Components and Architecture

Introduction to Log Management

Incident Detection and Analysis

Threat Intelligence and Hunting

Incident Response and Handling

DAY 2 Cloud Security 

  • Introduction to Cloud Security

  • Cloud Platform and Infrastructure Security in Cloud

  • Application Security in Cloud

  • Data Security in Cloud

  • Security Operations in Cloud

  • Cloud Penetration Testing in Cloud

  • Incident Response in Cloud

  • Forensic Investigation in Cloud

  • Business Continuity and Disaster Recovery in Cloud

  • Governance, Risk Management, and Compliance (GRC) in Cloud

  • Standards, Policies, and Legal Issues in Cloud

DAY 3  Ethical Hacking Cloud Infrastructure and IaaS

Learn the fundamentals of cloud computing and security. Encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.

  • Explore identity and access management in the cloud.

  • Learn about data protection and encryption in the cloud.

  • Gain knowledge of network security in cloud environments.

  • Dive deep into application security in cloud environments.

  • Gain insights on cloud security monitoring and incident response.

  • Explore cloud security risk assessment and management.

  • Understand the basics of cloud compliance and governance.

EVENT 6-9pm - Executive mixer at the Energy Capital Patio

Meet professionals in Cyber, AI, IaaS and more at an exclusive event for executives

DAY 4 Risk Management in IaaS

  • Introduction to Risk Management

  • The Essentials of a Risk Management Program

  • Risk Management Frameworks

  • Risk Management Policies and Procedures

  • Risk-Based Audits

  • Third-Party Risk Management (TPRM)

  • Risk Management Positions

  • Risk Law

  • Procurement Risk Management

  • Risk Culture

  • Future of Risk Manageme

 Information Security Controls

Compliance Management

  • FISMA

  • GDPR

  • FFIEC

  • ISO Family of Standards

  • PCI DSS

  • NIST Special Publications

Audit Management

  • Audit Expectations and Outcomes

  • ISO/IEC Audit Guidance

  • Internal versus External Audits

  • Partnering with the Audit Organization

  • Compliance-Based Audits

  • Risk-Based Audits

  • Managing and Protecting Audit Documentation

  • Evaluating Audit Results and Report

  • Remediating Audit Findings

  • Leverage GRC Software to Support Audits

DAY 5 Infosec for Execs

Network Security

  • Assessments and Planning

  • Architecture Challenges

  • Design

  • Network Standards, Protocols, and Controls

Certified Chief

  • Network Security Controls

  • Wireless (Wi-Fi) Security

  • Wireless Risks

  • Wireless Controls

  • Voice over IP Security

Endpoint Protection

  • Threats

  • Vulnerabilities

  • End User Security Awareness

  • Endpoint Device Hardening

  • Endpoint Device Logging

  • Mobile Device Security

  • Mobile Device Risks

  • Mobile Device Security Controls

  • Internet of Things Security (IoT)

  • Protecting IoT Devices

Application Security

  • Secure SDLC Model

  • Secure Coding Practices

  • Separation of Development, Test, and Production Environments

  • Application Security Testing Approaches

  • DevSecOps

  • Waterfall Methodology and Security

  • Agile Methodology and Security

  • Application Hardening

  • Application Security Technologies

  • Version Control and Patch Management

  • Database Security

  • Database Hardening

Encryption Technologies

  • Encryption and Decryption

  • Cryptosystems

  • Blockchain

  • Digital Signatures and Certificates

  • PKI

  • Key Management

  • Encryption Strategy Development

  • Determining Critical Data Location and Type

  • Deciding What to Encrypt

  • Determining Encryption Requirements

  • Selecting, Integrating, and Managing Encryption Technologies

Cloud Computing Security

  • Overview of Cloud Computing

  • Security and Resiliency Cloud Services

  • Cloud Security Concerns

  • Cloud Security Controls

  • Cloud Computing Protection Considerations

Disruptive Technologies

  • Artificial Intelligence

  • Autonomous SOC

  • Dynamic Deception

  • Software-Defined Cybersecurity

Quantity:
TRAINING


Energy Capital LLP

Active Defense Training I

Course Outline

PRICE for THREE PARTICIPANTS (CEO/CISO/CxO) includes Certification Club from EC-Council.

1 Year access to curriculum, labs, and IaaS

3 EC-Council Certification qualifications

DAY 1 Security Operations Essentials

  • Computer Network and Security Fundamentals

  • Fundamentals of Cyber Threats

  • Introduction to Security Operations Center

  • SOC Components and Architecture

Introduction to Log Management

Incident Detection and Analysis

Threat Intelligence and Hunting

Incident Response and Handling

DAY 2 Cloud Security 

  • Introduction to Cloud Security

  • Cloud Platform and Infrastructure Security in Cloud

  • Application Security in Cloud

  • Data Security in Cloud

  • Security Operations in Cloud

  • Cloud Penetration Testing in Cloud

  • Incident Response in Cloud

  • Forensic Investigation in Cloud

  • Business Continuity and Disaster Recovery in Cloud

  • Governance, Risk Management, and Compliance (GRC) in Cloud

  • Standards, Policies, and Legal Issues in Cloud

DAY 3  Ethical Hacking Cloud Infrastructure and IaaS

Learn the fundamentals of cloud computing and security. Encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.

  • Explore identity and access management in the cloud.

  • Learn about data protection and encryption in the cloud.

  • Gain knowledge of network security in cloud environments.

  • Dive deep into application security in cloud environments.

  • Gain insights on cloud security monitoring and incident response.

  • Explore cloud security risk assessment and management.

  • Understand the basics of cloud compliance and governance.

EVENT 6-9pm - Executive mixer at the Energy Capital Patio

Meet professionals in Cyber, AI, IaaS and more at an exclusive event for executives

DAY 4 Risk Management in IaaS

  • Introduction to Risk Management

  • The Essentials of a Risk Management Program

  • Risk Management Frameworks

  • Risk Management Policies and Procedures

  • Risk-Based Audits

  • Third-Party Risk Management (TPRM)

  • Risk Management Positions

  • Risk Law

  • Procurement Risk Management

  • Risk Culture

  • Future of Risk Manageme

 Information Security Controls

Compliance Management

  • FISMA

  • GDPR

  • FFIEC

  • ISO Family of Standards

  • PCI DSS

  • NIST Special Publications

Audit Management

  • Audit Expectations and Outcomes

  • ISO/IEC Audit Guidance

  • Internal versus External Audits

  • Partnering with the Audit Organization

  • Compliance-Based Audits

  • Risk-Based Audits

  • Managing and Protecting Audit Documentation

  • Evaluating Audit Results and Report

  • Remediating Audit Findings

  • Leverage GRC Software to Support Audits

DAY 5 Infosec for Execs

Network Security

  • Assessments and Planning

  • Architecture Challenges

  • Design

  • Network Standards, Protocols, and Controls

Certified Chief

  • Network Security Controls

  • Wireless (Wi-Fi) Security

  • Wireless Risks

  • Wireless Controls

  • Voice over IP Security

Endpoint Protection

  • Threats

  • Vulnerabilities

  • End User Security Awareness

  • Endpoint Device Hardening

  • Endpoint Device Logging

  • Mobile Device Security

  • Mobile Device Risks

  • Mobile Device Security Controls

  • Internet of Things Security (IoT)

  • Protecting IoT Devices

Application Security

  • Secure SDLC Model

  • Secure Coding Practices

  • Separation of Development, Test, and Production Environments

  • Application Security Testing Approaches

  • DevSecOps

  • Waterfall Methodology and Security

  • Agile Methodology and Security

  • Application Hardening

  • Application Security Technologies

  • Version Control and Patch Management

  • Database Security

  • Database Hardening

Encryption Technologies

  • Encryption and Decryption

  • Cryptosystems

  • Blockchain

  • Digital Signatures and Certificates

  • PKI

  • Key Management

  • Encryption Strategy Development

  • Determining Critical Data Location and Type

  • Deciding What to Encrypt

  • Determining Encryption Requirements

  • Selecting, Integrating, and Managing Encryption Technologies

Cloud Computing Security

  • Overview of Cloud Computing

  • Security and Resiliency Cloud Services

  • Cloud Security Concerns

  • Cloud Security Controls

  • Cloud Computing Protection Considerations

Disruptive Technologies

  • Artificial Intelligence

  • Autonomous SOC

  • Dynamic Deception

  • Software-Defined Cybersecurity


Energy Capital LLP

Active Defense Training I

Course Outline

PRICE for THREE PARTICIPANTS (CEO/CISO/CxO) includes Certification Club from EC-Council.

1 Year access to curriculum, labs, and IaaS

3 EC-Council Certification qualifications

DAY 1 Security Operations Essentials

  • Computer Network and Security Fundamentals

  • Fundamentals of Cyber Threats

  • Introduction to Security Operations Center

  • SOC Components and Architecture

Introduction to Log Management

Incident Detection and Analysis

Threat Intelligence and Hunting

Incident Response and Handling

DAY 2 Cloud Security 

  • Introduction to Cloud Security

  • Cloud Platform and Infrastructure Security in Cloud

  • Application Security in Cloud

  • Data Security in Cloud

  • Security Operations in Cloud

  • Cloud Penetration Testing in Cloud

  • Incident Response in Cloud

  • Forensic Investigation in Cloud

  • Business Continuity and Disaster Recovery in Cloud

  • Governance, Risk Management, and Compliance (GRC) in Cloud

  • Standards, Policies, and Legal Issues in Cloud

DAY 3  Ethical Hacking Cloud Infrastructure and IaaS

Learn the fundamentals of cloud computing and security. Encounter security misconfigurations, SQL injection vulnerabilities, directory browsing vulnerabilities, enumeration vulnerabilities, and opportunities to escalate privileges and gain access to privileged information.

  • Explore identity and access management in the cloud.

  • Learn about data protection and encryption in the cloud.

  • Gain knowledge of network security in cloud environments.

  • Dive deep into application security in cloud environments.

  • Gain insights on cloud security monitoring and incident response.

  • Explore cloud security risk assessment and management.

  • Understand the basics of cloud compliance and governance.

EVENT 6-9pm - Executive mixer at the Energy Capital Patio

Meet professionals in Cyber, AI, IaaS and more at an exclusive event for executives

DAY 4 Risk Management in IaaS

  • Introduction to Risk Management

  • The Essentials of a Risk Management Program

  • Risk Management Frameworks

  • Risk Management Policies and Procedures

  • Risk-Based Audits

  • Third-Party Risk Management (TPRM)

  • Risk Management Positions

  • Risk Law

  • Procurement Risk Management

  • Risk Culture

  • Future of Risk Manageme

 Information Security Controls

Compliance Management

  • FISMA

  • GDPR

  • FFIEC

  • ISO Family of Standards

  • PCI DSS

  • NIST Special Publications

Audit Management

  • Audit Expectations and Outcomes

  • ISO/IEC Audit Guidance

  • Internal versus External Audits

  • Partnering with the Audit Organization

  • Compliance-Based Audits

  • Risk-Based Audits

  • Managing and Protecting Audit Documentation

  • Evaluating Audit Results and Report

  • Remediating Audit Findings

  • Leverage GRC Software to Support Audits

DAY 5 Infosec for Execs

Network Security

  • Assessments and Planning

  • Architecture Challenges

  • Design

  • Network Standards, Protocols, and Controls

Certified Chief

  • Network Security Controls

  • Wireless (Wi-Fi) Security

  • Wireless Risks

  • Wireless Controls

  • Voice over IP Security

Endpoint Protection

  • Threats

  • Vulnerabilities

  • End User Security Awareness

  • Endpoint Device Hardening

  • Endpoint Device Logging

  • Mobile Device Security

  • Mobile Device Risks

  • Mobile Device Security Controls

  • Internet of Things Security (IoT)

  • Protecting IoT Devices

Application Security

  • Secure SDLC Model

  • Secure Coding Practices

  • Separation of Development, Test, and Production Environments

  • Application Security Testing Approaches

  • DevSecOps

  • Waterfall Methodology and Security

  • Agile Methodology and Security

  • Application Hardening

  • Application Security Technologies

  • Version Control and Patch Management

  • Database Security

  • Database Hardening

Encryption Technologies

  • Encryption and Decryption

  • Cryptosystems

  • Blockchain

  • Digital Signatures and Certificates

  • PKI

  • Key Management

  • Encryption Strategy Development

  • Determining Critical Data Location and Type

  • Deciding What to Encrypt

  • Determining Encryption Requirements

  • Selecting, Integrating, and Managing Encryption Technologies

Cloud Computing Security

  • Overview of Cloud Computing

  • Security and Resiliency Cloud Services

  • Cloud Security Concerns

  • Cloud Security Controls

  • Cloud Computing Protection Considerations

Disruptive Technologies

  • Artificial Intelligence

  • Autonomous SOC

  • Dynamic Deception

  • Software-Defined Cybersecurity