ליצירת קשר
whatsapp
לימודי הייטק ב-INT LIVE
טלפון

Information Security Management

.Cybersecurity risk management takes the idea of real world risk management and applies it to the cyberworld. IT Departments rely on a combination of strategies, technologies and user education to protect an enterprise against cybersecurity attacks that can compromise systems, steal data and other valuable company information, and damage an enterprise’s reputation. As the volume and severity of cyber attacks grow, the need for cybersecurity risk management grows with it. It involves identifying your risks and vulnerabilities and applying administrative actions and comprehensive solutions to make sure your organization is adequately protected.

>>
Duration: Hours 40
Who should attend? Information Security Officers, IT Security Professionals and Managers, Others with the passion and eagerness to discover and learn new topics.

Java Secure Coding

Secure coding is the practice of developing computer software in a way that guards against the accidental introduction of security vulnerabilities. Defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. By identifying the insecure coding practices that lead to these errors and educating developers on secure alternatives, organizations can take proactive steps to help significantly reduce or eliminate vulnerabilities in software before deployment.

>>
Duration: Hours 40
Who should attend? Developers who are familiar with .Net or Java programming

CISSP – Certified Information System Security Professional

The CISSP training course covers topics such as Access Control Systems, Cryptography, and Security Management Practices, teaching students the eight domains of information system security knowledge. The CISSP Certification is administered by the International Information Systems Security Certification Consortium or (ISC)². The CISSP certification provides information security professionals with not only an objective measure of competence, but a globally recognized standard of achievement.

>>
Duration: Hours 80
Who should attend? Experienced IT security-related practitioners, auditors, consultants, investigators or instructors, including network or security analysts and engineers, network administrators, information security specialists and risk management professionals,

Red Team Expert

There is only way to become really good at cybersecurity: you must know both how to attack and how to defend. First of all, you have to learn to think like a hacker, so you deeply understand what the threats are. Then you’ll need to know how to protect yourself from the attacks. We start with precise descriptions and examples of network attacks to show you how the malicious hackers can break into your network—and what harm they can do. Then we’ll look at another attack vector: websites and web-applications. You’ll see the most vulnerable places and understand what cybercriminals will do if they find them. Then we’ll discover the third vector of attacks: humans. Refined hackers know how to hack a human brain first to hack digital assets. You’ll find out what social engineering, phishing, and spear-phishings, and why they’re becoming especially dangerous today. By the end of this course, you’ll be able to locate all your vulnerabilities and remediate them before malicious hackers find and exploit them.

>>
Duration: Hours 60
Who should attend? IT security professionals, Malware Analysts that want to get better understanding of attacker’s perspective, Security Analysts who want to advance their knowledge in the cybersecurity field, Digital Forensics experts, Others with the passion and eagerness to discover and learn new topics.

Blue Team Defender

This course introduces the tools common to a defender's work environment, and packs in all the essential explanations of tools, processes, and data flow that every blue team member needs to know. you will learn the stages of security operations: how data is collected, where it is collected, and how threats are identified within that data. The class dives deep into tactics for triage and investigation of events that are identified as malicious, as well as how to avoid common mistakes and perform continual high-quality analysis. Students will learn the inner workings of the most popular protocols, and how to identify weaponized files as well as attacks within the hosts and data on their network.

>>
Duration: Hours 40
Who should attend? Security Analysts, Incident Investigators, Security Engineers and Architects, Technical Security Managers, SOC Managers looking to gain additional technical perspective on how to improve analysis quality, reduce turnover, and run an efficient SOC, and Anyone looking to start their career on the blue team

Mobile Ethical Hacking

Mobile hacking is an emerging threat targeting many end users and enterprises. Cyber criminals launch many mobile attacks including mobile phishing attacks since they can take advantage of certain limitations of the mobile platform. This Course will prepare you to effectively evaluate the security of mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test – all critical skills required to protect and defend mobile device deployments. You will learn basic principles, mobile network architecture, mobile app development, policy and enforcement rules, mobile code analysis, penetration testing and mobile ethical hacking. for better defend your organization against the onslaught of mobile device attacks

>>
Duration: Hours 40
Who should attend? Students should have familiarity with network penetration testing concepts
לקביעת שיחת ייעוץ חינם