|ISO 27002 Foundation- A Practical Approach to Information Security||Governance|
|Web Application Vulnerability Assessment and Penetration Testing||Application Security/ Technical|
|Kali Linux Implementation & Administration||Host Security/ Administration|
|Data Privacy Act: A Practical Approach to Compliance||Governance/ Privacy/ Legal|
ISO 27002 Foundation- A Practical Approach to Information Security
The course targets individuals who want to equip themselves with knowledge of the various aspects of information security. They will learn the CIA triad, risk analysis, information security incidents and weaknesses, physical measures, technical measures, organizational measures and legislation and regulations.
After the course, the participants will be prepared to take the Information Security Foundation (based on ISO/IEC 27002) certification exam by Exin.
Module 1: Introduction to Information Security
Module 2: Risk Analysis
Module 3: Security Incident Management
Module 4: Security Measures
Module 5: Legislation and Organization
Module 6: Preparing for the ISO 27001 Audit
Web Application Vulnerability Assessment and Penetration Testing
This 1-day course aims to teach security assessment methodology and techniques for individuals or organizations that intend to conduct VAPT for their organization’s applications or consultancy purposes. The course focuses on the organized steps of VAPT, from scoping to reporting and the technical aspects in between. Various tools will be used such as Burp Suite, ZAP, Maltego, Nikto Dirbuster, BeeF etc. that can help assessors in their testing. Vulnerability discovery, exploitation and remediation based on the OWASP Testing Guide will also be discussed.
Module 1: Theoretical Concepts on Web Applications
Module 2: Reconnaissance and Mapping
Module 3: Discovery and Exploitation
Module 4: Preparing for a Security Assessment
Kali Linux Implementation & Administration
This 1-day course aims to teach how to build a working environment using the Kali Linux Distribution. Kali Linux is the primary platform used as a toolkit by ethical hackers in their penetration tests. The course will help the participants become proficient with Kali Linux and explore its features. At the end of the course, the participants will be equipped with the knowledge to setup their own test environment for vulnerability assessment and penetration testing for their respective organizations.
Module 1: Getting Started with Kali Linux
Module 2: Booting and Installing Kali Linux
Module 3: Adding Persistence in Kali Linux
Module 4: Securing and Monitoring Kali Linux
Data Privacy Act of 2012: A Primer
This course aims to provide essential knowledge and to be familiarized with the fundamental principles, terminologies, and legal obligations on the new data privacy law. This workshop also aims to help the participants get started and ensure data privacy compliance.
Module 1: Introduction to Data Privacy Act of 2012 (DPA)
Module 2: Commit to Comply: Appointing a Data Protection Officer (DPO)
Module 3: Know Your Risks: Conduct a Privacy Impact Assessment (PIA)
Module 4: Write Your Plan: Create Your Privacy Management Program/Manual (PMP/PMM)
Module 5: Be Accountable: Implement Privacy and Data Protection (PDP) Measures
Module 6: Be Prepared: Regularly Exercise Your Breach Reporting Procedures (BRP)