Topic Category
ISO 27002 Foundation- A Practical Approach to Information Security Governance
Web Application Vulnerability Assessment and Penetration Testing Application Security/ Technical
Kali Linux Implementation & Administration Host Security/ Administration
Data Privacy Act: A Practical Approach to Compliance Governance/ Privacy/ Legal

 


ISO 27002 Foundation- A Practical Approach to Information Security

The course targets individuals who want to equip themselves with knowledge of the various aspects of information security. They will learn the CIA triad, risk analysis, information security incidents and weaknesses, physical measures, technical measures, organizational measures and legislation and regulations.

After the course, the participants will be prepared to take the Information Security Foundation (based on ISO/IEC 27002) certification exam by Exin.

Module 1: Introduction to Information Security

Module 2: Risk Analysis

Module 3: Security Incident Management

Module 4: Security Measures

Module 5: Legislation and Organization

Module 6: Preparing for the ISO 27001 Audit


Web Application Vulnerability Assessment and Penetration Testing

This 1-day course aims to teach security assessment methodology and techniques for individuals or organizations that intend to conduct VAPT for their organization’s applications or consultancy purposes. The course focuses on the organized steps of VAPT, from scoping to reporting and the technical aspects in between. Various tools will be used such as Burp Suite, ZAP, Maltego, Nikto Dirbuster, BeeF etc. that can help assessors in their testing. Vulnerability discovery, exploitation and remediation based on the OWASP Testing Guide will also be discussed.

Module 1: Theoretical Concepts on Web Applications

Module 2: Reconnaissance and Mapping

Module 3: Discovery and Exploitation

Module 4: Preparing for a Security Assessment


Kali Linux Implementation & Administration

This 1-day course aims to teach how to build a working environment using the Kali Linux Distribution. Kali Linux is the primary platform used as a toolkit by ethical hackers in their penetration tests. The course will help the participants become proficient with Kali Linux and explore its features. At the end of the course, the participants will be equipped with the knowledge to setup their own test environment for vulnerability assessment and penetration testing for their respective organizations.

Module 1: Getting Started with Kali Linux

Module 2: Booting and Installing Kali Linux

Module 3: Adding Persistence in Kali Linux

Module 4: Securing and Monitoring Kali Linux


Data Privacy Act of 2012: A Primer

This course aims to provide essential knowledge and to be familiarized with the fundamental principles, terminologies, and legal obligations on the new data privacy law. This workshop also aims to help the participants get started and ensure data privacy compliance.

Module 1: Introduction to Data Privacy Act of 2012 (DPA)

Module 2: Commit to Comply: Appointing a Data Protection Officer (DPO)

Module 3: Know Your Risks: Conduct a Privacy Impact Assessment (PIA)

Module 4: Write Your Plan: Create Your Privacy Management Program/Manual (PMP/PMM)

Module 5: Be Accountable: Implement Privacy and Data Protection (PDP) Measures

Module 6: Be Prepared: Regularly Exercise Your Breach Reporting Procedures (BRP)