Cyber Security Operations Specialist

Size: px
Start display at page:

Download "Cyber Security Operations Specialist"

Transcription

1 DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd ST Electronics (Info-Security) Page 1

2 Cyber Security Operations Essentials: Live cyber security training to build Detection, Response & Recovery capability In today s ever-evolving security environment, organisations, enterprises and governmental institutions face new threats and the possibility of cyber-attacks every day. To counter these threats, organisations invest heavily in the Protection aspect of cyber security to safeguard their business systems. At the same time, infosecurity or cyber security teams are sent for training for more in-depth knowledge in cyber security, so that they can lay the right foundation. Yet, breaches occur. Knowledge is Important, Response is Essential Clearly, knowledge in the techniques required to secure your organisation s critical IT assets and business systems is important. Operational skills to detect genuine cyber threats, respond adequately, and recover appropriately in the event of compromise, however, is beyond important. It is critical. Operational-centric cyber security training allows trainees to hone their cyber security cognitive and analytical skillsets on real-world, live networks, with real malware and exploits. Whether you are a cyber security professional, or an IT professional tasked to manage your business s IT infrastructure, (CSOS) centres on equipping you and your team with the right skillsets and competencies to keep an organisation secure not just in head-based knowledge, but in operational proficiency. Specifically, CSOS focuses on the cognitive and analytical abilities of participants, in addition to knowledge. CSOS s emphasis is on equipping participants with cyber defence operational skillsets that will be ingrained in individuals on a day-to-day basis. Who Should Attend Cyber Security Professionals looking to upskill their level of security operations proficiency IT Professionals / Engineers looking to multi-skill themselves in cyber security operations or looking to take on a cyber security-related job role System / Network Administrators requiring a better understanding of cyber security operations Information Security Managers and Executives involved in cyber security operations Project Managers, Risk Managers and Compliance Managers who require an understanding of cyber security operations processes and outcomes ST Electronics (Info-Security) Page 2

3 Course Focus Real-World, Operations-Centric Cyber Defence Training State-of-the-Art Cyber Training Platform Emulation of real-world conditions such as network structure, network characteristics, and traffic, with real malware and exploits. True and accurate reflection of what it would be like to experience the entire kill-chain of cyberattack(s) in a controlled environment First in Singapore and the region Course Structure Day One a. Cyber Security Imperatives Cyber threats, trends, terms and terminologies CIA, AAA, standards, audit, compliance and regulations Cryptography and applications b. Network Technologies and Security Introduction to network systems, types and devices Secure network protocol (SSL/TLS, SSH) Introduction to network security devices (Firewall, IPS/IDS, SIEM, etc.) c. Server Systems and Logs Types and functions of servers (web, database, mail, AD, etc.) OS, servers and their event logs (Windows, Linux,IIS, Apache, Mssql, sendmail and etc.) Day Two d. Attack Methodology and Types Attack phases Types of vulnerabilities and attacks Web-based attack (OWASP top 10) e. Security Operations Centre and Incident Response Different types of information security incident Information security incident management framework Overview to SOC concepts and operations Threat identification, threat correlation, threat aggregation, threat filtering (through applications and server logs) Incident handling, response management, notification and reporting f. Security Products and Hands-On Checkpoint Firewall, Security Information and Event Management(SIEM) Monitoring tools such as Wireshark, Process Monitor Day Three to Five g. Security Operations Centre Cyber-Attack Scenario-based Exercises Exposure to real-world cyber-attack scenarios Developing detection, and response skills through team-based exercises ST Electronics (Info-Security) Page 3

4 About the Trainers Trainers conducting the include: Meny Har CTO and Principal Trainer Meny Har is the CTO of the DigiSAFE Cyber Security Centre, where leads the Centre s technology strategy and anchors all training curriculum and course design. He is also the Principal Trainer of DigiSAFE Cyber Security Centre. Meny possesses nearly a decade of experience in the cyber security industry. He has a rich and versatile technological background combining cyber security solution architecture and design as well as hands-on managerial cyber security experience as a Cyber Security Department Head for one of the Israeli Defense Forces (IDF) primary commands. Prior to joining the centre, Meny was the chief solution architect for Elbit System s cutting-edge Cyber Training System, where he led the design and development efforts for all aspects of the system. Additionally, Meny has spent many years of service in the IDF in the Info-Sec branch of the Intelligence Corps, most of which in commanding-managing positions. During that time, he led all security operations activities in one of IDF s primary commands and administered all of its Info-Sec strategy and policies. Meny also holds a B.Sc.in Computer and Electrical Engineering from the Hebrew University of Jerusalem, one of Israel s leading academic institutions. Chan Yue Meng Trainer Chan Yue Meng is a Cyber Security Analyst and Researcher, as well as Trainer at ST Electronics (Info- Security) Pte Ltd. A part of ST Engineering Group s Security Operations Centre (SOC) team, he oversees all the security events on all Singapore Technologies companies. Yue Meng possesses over 14 years of experience in the area of systems and networks. In his current capacity, he examines current threats and methods of deliverance used to deliver the payload especially through web. His responsibilities include being the key malware analyst, who determines and verifies rules on new threat discovered. He also manages junior analysts and guides the team in analysing raw and correlated events triggered or collected by our existing SIEM. Yue Meng, too, plays a key role in the forensic team by providing md5sum of suspected malware which is overlooked by existing security infrastructure. He is familiar with penetration testing and actively tries to understand how an attacker thinks and operates as part of his overall cyber security work. Prior to that, Yue Meng was with the Infocomm Development Authority of Singapore (IDA) and seconded to the Ministry of Home Affairs (MHA) as part of a professional technical team which manages the SIEMS infrastructure and oversees the overall site deployment of SIEMS sensors at the customer sites. In that role, he is heavily involved in SOC operations too. ST Electronics (Info-Security) Page 4

5 Yue Meng s other roles include being the System Administrator of Nanyang Business School and MOL Ship Management, Network Administrator of Advance Network Technology Yue Meng holds a Bachelor of Science in Digital System Security from the University of Wollongong), Advanced Diploma in Networking and Communication and Specialist Diploma in Networking and Communication from Ngee Ann Polytechnic and Diploma in Computer Studies. His qualifications also include: Offensive Security Certified Professional (OSCP) GIAC Certified Incident Handler (GCIH) Red Hat Certified Technician Certified 3COM Network Administrator Cisco Certified Network Associate (CCNA) Zhang Youwei Trainer Zhang Youwei is a Cyber Security Engineer and Trainer at ST Electronics (Info-Security) Pte Ltd. He is experienced in the hardware aspects of Information Technology particularly quality assurance. More recently, Youwei redirected his focus to information security and cyber security. In his current capacity, Youwei is the Systems Lead for DigiSAFE Cyber Security Centre a Cyber Security Centre of Excellence housing a state-of-the-art Cyber Trainer Platform that delivers cyber scenarios-based experiential training, which is the first, and only-of-its-kind in Singapore and the region. He administers and operates the Cyber Trainer Platform for training, and also supports curriculum development and improvement. From a systems perspective, he is also the anchor in all customer and partner engagement. Prior to his current role, Youwei was with Advanced Micro Devices under the EDB LOT Programme. During his time in AMD, he was part of the Advanced Testing and Characterisation team with the responsibilities of formulating test scripts, analysing data and correlating subsequent results on new products. In that role, he received two awards, one individual and one as part of a group, for process improvement. Zhang Youwei holds a Bachelor of Engineering degree from National University of Singapore. He is also a Qualified Information Security Professional (AISP), and is pursuing a Certified Ethical Hacking (CEH) certification from EC Council. ST Electronics (Info-Security) Page 5

6 Course Details COURSE DETAILS Course Schedule: Time: Venue: Course Fees: Contact: Scheduled course runs for 2014: October November 1 5 December (Tentative) Day 1: Starts at 9:30am Day 2 to 5: Starts at 9:00am 5-day programme DigiSAFE Cyber Security Centre Jurong East Street 21, #04-02, Devan Nair Institute Singapore Scheduled course runs for 2015: January February March SGD$4,800 (Singaporeans and Permanent Residents) SGD$6,000 (Non-Singaporeans or Singaporean Permanent Residents) Singaporeans and PRs qualify for 70% WDA funding. Terms and Conditions apply. Ms Lai Yan Ting [email protected] Hotline: +(65) Note: (1) Not inclusive off Singapore goods and services tax (GST) (7%). (2) Course fees is inclusive of lunch. (3) ST Electronics (Info-Security) Pte Ltd reserves the right to make amendments to the course agenda without prior notice. Training Benefits Cyber Security Training based on DigiSAFE Cyber Security Centre s Cyber Trainer System benefits trainees by enhancing their ability to: 1. Appreciate the entire kill-chain of various cyber- attacks 2. Develop improved response to cyber attacks 3. Enhance decision-making in the event of cyber-attacks 4. Enhance the collaboration between team mates working together HOW? 1. Be exposed to a myriad or real-world cyber-attacks and participate in the verification of an attack Sharper Detection 2. Gain deeper insights on the actions and steps that can be taken and participate in the evaluation of the organisational and business impact of every action taken against cyber attackers Better Response 3. Sharpen the skills of the team in mitigating against attacks and participate in discussing how future attacks can be thwarted Smarter Mitigation ST Electronics (Info-Security) Page 6

7 About DigiSAFE Cyber Security Centre ST Electronics (Info-Security) set up the DigiSAFE Cyber Security Centre to offer advanced training courses in cyber security to meet increasing industry demand for such expertise. Training at the centre is supported by a Cyber Trainer System that emulates real world attacks on enterprise networks in a controlled environment. Trainees learn how to apply tools to protect, detect, respond and recover their networks from various types of cyber attacks. All training is designed to be operation-centric and experiential based. Location DigiSAFE Cyber Security Centre 80 Jurong East Street 21 #04-02 Devan Nair Institute Singapore We Are Here ST Electronics (Info-Security) Page 7

8 DigiSAFE Cyber Security Centre 80 Jurong East Street 21 #04-02 Singapore Phone : (65) / (65) Fax : (65) [email protected] No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of ST Electronics (Info-Security) Pte Ltd. The information contained herein may be changed without prior notice. These materials are provided by ST Electronics (Info-Security) Pte Ltd for informational purposes only, without representation or warranty of any kind, and ST Electronics (Info- Security) Pte Ltd shall not be liable for errors or omissions with respect to the materials. The only warranties for ST Electronics (Info-Security) Pte Ltd products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. ST Electronics (Info-Security) Page 8

Cyber Security Operations Associate

Cyber Security Operations Associate ST Electronics (Info-Security) Pte Ltd ST Electronics (Info-Security) Page 1 Cyber Security Operations Essentials: Live cyber security training to build Detection, Response & Recovery capability In today

More information

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd NICF Cyber Security Operations Specialist Page 1 Cyber Security Operations Essentials 1.

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Information Technology Cluster

Information Technology Cluster Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the

More information

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis Training Brochure Synopsis This Four-day practical training is designed for Information Systems auditors, application

More information

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION)

INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION) PART TIME DIPLOMA IN INFOCOMM & DIGITAL MEDIA (IT NETWORK AND SYSTEM ADMINISTRATION) Introduction This Course is designed to equip students with a good working knowledge in IT networking and system administration

More information

OVERVIEW DEGREES & CERTIFICATES

OVERVIEW DEGREES & CERTIFICATES OVERVIEW DEGREES & CERTIFICATES 015 The best. Made better. SANS graduate programs are the ultimate expression of our 25 years dedicated to the education and development of information security professionals.

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

Ty Miller. Director, Threat Intelligence Pty Ltd

Ty Miller. Director, Threat Intelligence Pty Ltd Ty Miller Director, Threat Intelligence Pty Ltd Security Specialist Creator of Threat Analytics CREST Tech Lead, Assessor, Board of Directors Trained likes of FBI, US DoD, US Mil, International Govt agencies,

More information

Information Technology 2015 Programmes

Information Technology 2015 Programmes Information Technology 2015 Programmes Well connected. Right here Innovation, intelligence and ingenuity. Do you have what it takes to make technology work? IT is a booming industry worth an estimated

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Security Training Programs

Security Training Programs Security Training Programs. www.emagined.com Overview According to numerous sources, nothing in the information security arena brings a better return on investment (ROI) than security training and awareness.

More information

Information Systems Security Certificate Program

Information Systems Security Certificate Program Information Technologies Programs Information Systems Security Certificate Program Accelerate Your Career extension.uci.edu/infosec University of California, Irvine Extension s professional certificate

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

Microsoft Technologies

Microsoft Technologies NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. FREE TO TRANSITIONING VETERANS FAST TRACK Four steps to a cybersecurity career QUALIFY Earn Acceptance TRAIN Build Elite Skills CERTIFY Earn

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

The Business Case for Security Information Management

The Business Case for Security Information Management The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un

More information

ANNUAL SURVEY ON INFOCOMM MANPOWER FOR 2014

ANNUAL SURVEY ON INFOCOMM MANPOWER FOR 2014 ANNUAL SURVEY ON INFOCOMM MANPOWER FOR 2014 Infocomm Development Authority of Singapore 10 Pasir Panjang Road #10-01 Mapletree Business City Singapore 117438 Republic of Singapore Tel: (65) 6211-0888 Fax:

More information

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE RECOGNIZED PROVEN RESPECTED MARKETABLE FLEXIBLE Fernanda Tapia Student SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS Apply today: strayer.edu/apply FLEXIBLE / AFFORDABLE

More information

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO

TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Protect Your Connected Business Systems by Identifying and Analyzing Threats

Protect Your Connected Business Systems by Identifying and Analyzing Threats SAP Brief SAP Technology SAP Enterprise Threat Detection Objectives Protect Your Connected Business Systems by Identifying and Analyzing Threats Prevent security breaches Prevent security breaches Are

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

Computer Security and Investigations

Computer Security and Investigations Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Siemens Osakeyhtiö Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Restricted Siemens Osakeyhtiö 2015. All Rights Reserved. siemens.fi/answers Cyber security

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION

SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION SELECTION // ASSESSMENT // TRAINING EXAMINATION //GRADUATION 1 Why SANS Cyber Academy? We know that the lack of cyber security skills is hardly going to be news to you. The fact that there is a solution

More information

HP Fortify Software Security Center

HP Fortify Software Security Center HP Fortify Software Security Center Proactively Eliminate Risk in Software Trust Your Software 92% of exploitable vulnerabilities are in software National Institute for Standards and Technology (NIST)

More information

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Course Descriptions November 2014

Course Descriptions November 2014 Master of Science In Information Security Management Course Descriptions November 2014 Master of Science in Information Security Management The Master of Science in Information Security Management (MSISM)

More information

Technical Testing. Network Testing DATA SHEET

Technical Testing. Network Testing DATA SHEET DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce

More information

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with

More information

of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744

of Highly Effective Security Professionals By Sondra Schneider CEO Security University s0ndra@securityuniversity.net 203.357.7744 6 Skills of Highly Effective Security Professionals By Sondra Schneider CEO Security University [email protected] 203.357.7744 Basic Principles The Basic Principles of InfoSecurity are Universal

More information

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding

More information

Zak Khan Director, Advanced Cyber Defence

Zak Khan Director, Advanced Cyber Defence Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

ALERT LOGIC FOR HIPAA COMPLIANCE

ALERT LOGIC FOR HIPAA COMPLIANCE SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare

More information

MANAGED SECURITY SERVICES (MSS)

MANAGED SECURITY SERVICES (MSS) MANAGED SECURITY SERVICES (MSS) THE CYBER SECURITY INITIATIVE. Cybercrime is becoming an important factor for CIOs and IT professionals, but also for CFOs, compliance officers and business owners. The

More information

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited

Excellence Doesn t Need a Certificate. Be an. Believe in You. 2014 AMIGOSEC Consulting Private Limited Excellence Doesn t Need a Certificate Be an 2014 AMIGOSEC Consulting Private Limited Believe in You Introduction In this age of emerging technologies where IT plays a crucial role in enabling and running

More information

New-Age Master s Programme

New-Age Master s Programme New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique

More information

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Computer Information Science xxx

Computer Information Science xxx xxx The mission of the Faculty is to provide future-focused, studentcentred programmes that prepare students for the dynamic Information Systems and Information sectors of the UAE. CIS programme graduates

More information

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products

The Security Development Lifecycle at SAP How SAP Builds Security into Software Products SAP Security Concepts and Implementation The Security Development Lifecycle at SAP How SAP Builds Security into Software Products Table of Contents 4 Integrating Security Right from the Start 4 Establishing

More information

North American Electric Reliability Corporation (NERC) Cyber Security Standard

North American Electric Reliability Corporation (NERC) Cyber Security Standard North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

COMPUTER NETWORKS AND SECURITY A FUTURE IN

COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS AND SECURITY A FUTURE IN COMPUTER NETWORKS & SECURITY WHAT ARE CAREERS IN NETWORKS AND SECURITY ALL ABOUT? Computer networks are an inextricable part of modern life. We use computers

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

New-Age Undergraduate Programme

New-Age Undergraduate Programme New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options

More information

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012 2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit

More information

IBM Security QRadar Risk Manager

IBM Security QRadar Risk Manager IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to

More information

Programme In Information Security Management

Programme In Information Security Management Programme In Information Security Management One-year programme in Information Security (IS) MIEL Academy is pleased to announce PRISM TM (Programme in Information Security Management) a one-year Fulltime

More information

JOB DESCRIPTION CONTRACTUAL POSITION

JOB DESCRIPTION CONTRACTUAL POSITION Ref #: IT/P /01 JOB DESCRIPTION CONTRACTUAL POSITION JOB TITLE: INFORMATION AND COMMUNICATIONS TECHNOLOGY (ICT) SECURITY SPECIALIST JOB SUMMARY: The incumbent is required to provide specialized technical

More information

Unified Security Management and Open Threat Exchange

Unified Security Management and Open Threat Exchange 13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

ITU-IMPACT Training and Skills Development Course Catalogue

ITU-IMPACT Training and Skills Development Course Catalogue ITU-IMPACT Training and Skills Development Course Catalogue Management Track Technical Track Course Area Management Incident Response Digital Forensics Network Application Law Enforcement Foundation Management

More information

Protect Your Business and Customers from Online Fraud

Protect Your Business and Customers from Online Fraud DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently

More information

Extreme Networks Security Analytics G2 Risk Manager

Extreme Networks Security Analytics G2 Risk Manager DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential

More information

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers. National Unit specification General information Unit code: H9HY 45 Superclass: CC Publication date: September 2015 Source: Scottish Qualifications Authority Version: 02 Unit purpose The purpose of this

More information

HP Security Solutions for Microsoft

HP Security Solutions for Microsoft HP Security Solutions for the Microsoft Environment Achieving a secure adaptive enterprise How secure is your Microsoft environment? Enterprise boundaries are expanding, creating the need for faster, easier

More information

integrating cutting-edge security technologies the case for SIEM & PAM

integrating cutting-edge security technologies the case for SIEM & PAM integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,

More information

Using SIEM for Real- Time Threat Detection

Using SIEM for Real- Time Threat Detection Using SIEM for Real- Time Threat Detection Presentation to ISSA Baltimore See and secure what matters Joe Magee CTO and Co-Founder March, 27 2013 About us Vigilant helps clients build and operate dynamic,

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Master of Science in Cyber Security and Management

Master of Science in Cyber Security and Management Master of Science in Cyber Security and Management Introduction Realizing the importance of protecting her critical national information infrastructure, Malaysia has introduced the National Cyber Security

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

HP NonStop Server Security and HP ArcSight SIEM

HP NonStop Server Security and HP ArcSight SIEM HP NonStop Customer Technical Talk HP NonStop Server Security and HP ArcSight SIEM 04/12/2012 HP NonStop Karen Copeland HP Enterprise Security Morgan DeRodeff XYPRO Barry Forbes NonStop Enterprise Division

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com

Social Media Security Training and Certifications. Stay Ahead. Get Certified. Ultimate Knowledge Institute. ultimateknowledge.com Ultimate Knowledge Institute ultimateknowledge.com Social Media Security Training and Certifications Social Media Security Professional (SMSP) Social Media Engineering & Forensics Professional (SMEFP)

More information

Protecting against cyber threats and security breaches

Protecting against cyber threats and security breaches Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target

More information