Cyber Security Operations Associate



Similar documents
Cyber Security Operations Specialist

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd

CYBER SECURITY TRAINING SAFE AND SECURE

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Protect Your Connected Business Systems by Identifying and Analyzing Threats

HP Fortify Software Security Center

Ty Miller. Director, Threat Intelligence Pty Ltd

Technical Testing. Network Testing DATA SHEET

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Hackers are here. Where are you?

The Business Case for Security Information Management

idata Improving Defences Against Targeted Attack

Cyber Security solutions

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Using SIEM for Real- Time Threat Detection

Power Smart Business Operations with Real-Time Process Intelligence

CyberNEXS Global Services

Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou. ISACA Athens Chapter Conference Athens 4/11/2013

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

Advanced Threat Protection with Dell SecureWorks Security Services

R49 Using SAP Payment Engine for payment transactions. Process Diagram

How To Protect Your It Infrastructure

Zak Khan Director, Advanced Cyber Defence

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Learning Without Limits

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

The Cyber Threat Profiler

SAP Security Recommendations December Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.

2010 Data Breach Investigations Report

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Breach Found. Did It Hurt?

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Bellevue University Cybersecurity Programs & Courses

Information Technology Cluster

Changing the Enterprise Security Landscape

integrating cutting-edge security technologies the case for SIEM & PAM

Payment Card Industry Data Security Standard

How To Make Your Software More Secure

Practical Threat Intelligence. with Bromium LAVA

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Protecting against cyber threats and security breaches

Combating a new generation of cybercriminal with in-depth security monitoring

SuccessFactors Global Human Capital Management (HCM) Academy and Admin Training Schedule (Q3 Q4 2014)

Cyber Governance Preparing for the Inevitable Perimeter Breach

Critical Security Controls

As threat actors target various types of networks, companies with improperly configured network infrastructures risk the following repercussions:

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Beyond the Hype: Advanced Persistent Threats

JOB DESCRIPTION CONTRACTUAL POSITION

Control Traffic from Grey Routes and Boost Enterprise Messaging Revenue

SPEAR PHISHING UNDERSTANDING THE THREAT

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Apply today: strayer.edu/apply SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY MASTER OF SCIENCE IN INFORMATION SYSTEMS RECOGNIZED MARKETABLE FLEXIBLE

HP Security Solutions for Microsoft

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö

ONLINE RECONNAISSANCE

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

MSc Cyber Security. identity. hacker. virus. network. information

Hackers are here. Where are you?

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Cybersecurity: Protecting Your Business. March 11, 2015

Extreme Networks Security Analytics G2 Vulnerability Manager

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Εmerging Ways to Protect your Network

IT Security Strategy and Priorities. Stefan Lager CTO Services

CyberArk Privileged Threat Analytics. Solution Brief

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Enterprise Cybersecurity: Building an Effective Defense

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

The fast track to top skills and top jobs in cyber. Guaranteed.

Reference Architecture: Enterprise Security For The Cloud

Streamlining Web and Security

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Unified Security Management and Open Threat Exchange

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Managed Security Services for Data

HP NonStop Server Security and HP ArcSight SIEM

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Protect Your Business and Customers from Online Fraud

Defensible Strategy To. Cyber Incident Response

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

State of Security Monitoring of Public Cloud

ALERT LOGIC FOR HIPAA COMPLIANCE

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

The Importance of Cybersecurity Monitoring for Utilities

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Transcription:

ST Electronics (Info-Security) Pte Ltd ST Electronics (Info-Security) Page 1

Cyber Security Operations Essentials: Live cyber security training to build Detection, Response & Recovery capability In today s ever-evolving security environment, organisations, enterprises and governmental institutions face new threats and the possibility of cyber-attacks every day. To counter these threats, organisations invest heavily in the Protection aspect of cyber security to safeguard their business systems. At the same time, info-security or cyber security teams are sent for training for more in-depth knowledge in cyber security, so that they can lay the right foundation. Yet, breaches occur. Knowledge is Important, Response is Essential Clearly, knowledge in the techniques required to secure your organisation s critical IT assets and business systems is important. Operational-centric cyber security training allows trainees to hone their cyber security cognitive and analytical skillsets on real-world, live networks, with real malware and exploits. Operational skills to detect genuine cyber threats, respond adequately, and recover appropriately in the event of compromise, however, is beyond important. It is critical. Whether you are a Network Administrators, or an IT professional requiring a basic-level programme on cyber security, attend the (CSOA). This programme focuses on equipping individual with general cyber security knowledge and skillsets. It also enables you to acquire the necessary know-how and possess the relevant information security and information security operational skills and capabilities. Who Should Attend System / Network Administrators requiring a basic level programme on cyber security operations IT Professionals / Engineers looking to build up their foundation in cyber security operations or exploring to take on a cyber security-related job role ST Electronics (Info-Security) Page 2

Course Focus Real-World, Operations-Centric Cyber Defence Training State-of-the-Art Cyber Training Platform Emulation of real-world conditions such as network structure, network characteristics, and traffic, with real malware and exploits. True and accurate reflection of what it would be like to experience the entire kill-chain of cyberattack(s) in a controlled environment First in Singapore and the region Course Structure Day One a. Cyber Security Concepts Cyber Security Trends and Overview b. Network Technologies and Security Introduction to Network Systems Network Security c. Security Products and Hands-On Cheat sheets and logging Netstat Exercise Security Information and Event Management (SIEM) Day Two a. Attack Types and Methodology Attack phases Types of vulnerabilities and attacks Web-based attack (OWASP top 10) b. Security Aspects for IT Management c. Security Operations Centre and Incident Response Different types of information security incident Information security incident management framework Overview to SOC concepts and operations Threat identification, threat correlation, threat aggregation, threat filtering (through applications and server logs) Incident handling, response management, notification and reporting Day Three a. Security Products and Hands-On Checkpoint Firewall b. State-of-the-Art Cyber Training System Introduction Real-world cyber-attack scenario ST Electronics (Info-Security) Page 3

About the Trainers Trainers conducting the include: Meny Har CTO and Principal Trainer Meny Har is the CTO of the, where leads the Centre s technology strategy and anchors all training curriculum and course design. He is also the Principal Trainer of. Meny possesses nearly a decade of experience in the cyber security industry. He has a rich and versatile technological background combining cyber security solution architecture and design as well as hands-on managerial cyber security experience as a Cyber Security Department Head for one of the Israeli Defense Forces (IDF) primary commands. Prior to joining the centre, Meny was the chief solution architect for Elbit System s cutting-edge Cyber Training System, where he led the design and development efforts for all aspects of the system. Additionally, Meny has spent many years of service in the IDF in the Info-Sec branch of the Intelligence Corps, most of which in commanding-managing positions. During that time, he led all security operations activities in one of IDF s primary commands and administered all of its Info-Sec strategy and policies. Meny also holds a B.Sc.in Computer and Electrical Engineering from the Hebrew University of Jerusalem, one of Israel s leading academic institutions. Zhang Youwei Trainer Zhang Youwei is a Cyber Security Engineer and Trainer at ST Electronics (Info-Security) Pte Ltd. He is experienced in the hardware aspects of Information Technology particularly quality assurance. More recently, Youwei redirected his focus to information security and cyber security. In his current capacity, Youwei is the Systems Lead for a Cyber Security Centre of Excellence housing a state-of-the-art Cyber Trainer Platform that delivers cyber scenarios-based experiential training, which is the first, and only-of-its-kind in Singapore and the region. He administers and operates the Cyber Trainer Platform for training, and also supports curriculum development and improvement. From a systems perspective, he is also the anchor in all customer and partner engagement. Prior to his current role, Youwei was with Advanced Micro Devices under the EDB LOT Programme. During his time in AMD, he was part of the Advanced Testing and Characterisation team with the responsibilities of formulating test scripts, analysing data and correlating subsequent results on new products. In that role, he received two awards, one individual and one as part of a group, for process improvement. Zhang Youwei holds a Bachelor of Engineering degree from National University of Singapore. He is also a Qualified Information Security Professional (AISP), and is pursuing a Certified Ethical Hacking (CEH) certification from EC Council. ST Electronics (Info-Security) Page 4

Course Details COURSE DETAILS Course Schedule for Year 2015: Time: Venue: Course Fees: Contact: 18 20 May 22 24 June 13 15 July 17 19 August Day 1 3: Starts at 9:30am 3-day programme 80 Jurong East Street 21, #04-02 Devan Nair Institute, Singapore 609607 19 23 October 11 13 November 23 25 November SGD$2,500 (Singaporeans and Permanent Residents) Ms Lai Yan Ting lai.yanting@stee.stengg.com General Enquiries: +(65) 6513 9535 Ms Jolene Ng joleneng@stee.stengg.com Note: (1) Not inclusive off Singapore goods and services tax (GST) (7%). (2) Course fees is inclusive of lunch. (3) ST Electronics (Info-Security) Pte Ltd reserves the right to make amendments to the course agenda without prior notice. Training Benefits Cyber Security Training based on s Cyber Trainer System benefits trainees by enhancing their ability to: 1. Appreciate the entire kill-chain of various cyber- attacks 2. Develop improved response to cyber attacks 3. Enhance decision-making in the event of cyber-attacks 4. Enhance the collaboration between team mates working together HOW? 1. Be exposed to a myriad or real-world cyber-attacks and participate in the verification of an attack Sharper Detection 2. Gain deeper insights on the actions and steps that can be taken and participate in the evaluation of the organisational and business impact of every action taken against cyber attackers Better Response 3. Sharpen the skills of the team in mitigating against attacks and participate in discussing how future attacks can be thwarted Smarter Mitigation ST Electronics (Info-Security) Page 5

About ST Electronics (Info-Security) set up the to offer advanced training courses in cyber security to meet increasing industry demand for such expertise. Training at the centre is supported by a Cyber Trainer System that emulates real world attacks on enterprise networks in a controlled environment. Trainees learn how to apply tools to protect, detect, respond and recover their networks from various types of cyber attacks. All training is designed to be operation-centric and experiential based. Location 80 Jurong East Street 21 #04-02 Devan Nair Institute Singapore 609607 We Are Here ST Electronics (Info-Security) Page 6

www.digisafe.com/dcsc 80 Jurong East Street 21 #04-02 Singapore 609607 Phone : (65) 6513 9535 / (65) 6568 7118 Fax : (65) 6568 7226 Email : info_digisafe@stee.stengg.com No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of ST Electronics (Info-Security) Pte Ltd. The information contained herein may be changed without prior notice. These materials are provided by ST Electronics (Info-Security) Pte Ltd for informational purposes only, without representation or warranty of any kind, and ST Electronics (Info- Security) Pte Ltd shall not be liable for errors or omissions with respect to the materials. The only warranties for ST Electronics (Info-Security) Pte Ltd products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. ST Electronics (Info-Security) Page 7