Description
This advanced cybersecurity training is designed for professionals aiming to master key concepts in Information Systems Governance (GISA), Incident Detection and Response (SAD), Network and DNS Security, and national cybersecurity strategy (DSR). It blends theory, hands-on labs, real-world case studies, and certification preparation.
Who is this training for ?
For whom ?
- Information Systems Security Managers (ISSM).
- System and Network Administrators.
- Cybersecurity Consultants.
- SOC / CERT Analysts.
- Professionals transitioning into cybersecurity roles.
- Basic knowledge of networking (TCP/IP, DNS), OS (Linux/Windows), and security (firewall, IDS).
- Familiarity with ISO 27001 and SIEM tools recommended.
Training objectives
Training program
- Strategic Foundations of Cybersecurity and Governance
- Key principles: confidentiality, integrity, availability, resilience, and privacy protection.
- Aligning cybersecurity with business objectives.
- Information security governance frameworks (ISO 27001, NIST CSF, CIS Controls, SOC2).
- Risk management: EBIOS, threat modeling, and mapping.
- Regulatory compliance: GDPR, ISO standards, legal frameworks.
- Cybersecurity KPIs and executive dashboards.
- Modern SOC Architecture, Detection, and Monitoring
- SOC roles and maturity models (SOC-CMM, MITRE D3FEND).
- Telemetry and data collection: logs, network flows, endpoints, cloud.
- Monitoring tools: Zeek, Suricata, Sysmon.
- Detection engineering and alert tuning (MITRE ATT&CK, Indicators of Compromise).
- SIEM/SOAR platforms: integrations with Splunk, Sentinel, Elastic.
- Red Team, Blue Team, and Purple Team collaboration.
- Cyber Threat Intelligence and adversary emulation.
- Incident Response and Crisis Management
- Full incident response lifecycle: identification, containment, eradication, recovery.
- Playbook and runbook development based on NIST, SANS, ISO 27035.
- Case studies: ransomware, insider threats, supply chain attacks.
- Basics of forensics and chain of custody.
- Business continuity and cyber resilience planning.
- Crisis communication and stakeholder reporting.
- Network, Infrastructure, and Application Security
- Network security: segmentation, VPN, IPsec, TLS, next-gen firewalls.
- DNS security: DNSSEC, filtering, DDoS protection.
- Vulnerability management: patching, scanning, lifecycle management.
- Application security: OWASP Top 10, API security, SSRF.
- Cloud security and hybrid workload protection.
- Zero Trust Architecture, IAM, and Data Protection
- Zero Trust principles, architecture, and implementation.
- Identity and Access Management (IAM), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), Entra ID.
- Secure Software Development Lifecycle (Secure SDLC).
- Data protection strategies: Data Loss Prevention (DLP), encryption, tokenization.
- Advanced threat awareness: AI-related threats, insider risks, sophisticated ransomware.