Topic Category
ISO 27002 Foundation- A Practical Approach to Information Security Governance
Web Application Vulnerability Assessment and Penetration Testing Application Security/ Technical
Kali Linux Implementation & Administration Host Security/ Administration
Data Privacy Act: A Practical Approach to Compliance Governance/ Privacy/ Legal
A Practical Workshop on Conducting Audit Cycles Governance/ Audit
Introduction pfSense Administration Network Security/Technical
Practical Approach to Cybersecurity Incident Handling Security Operations/Technical
Using Kali Linux Tools for Security Testing Part 1 Penetration Testing/Technical
Using Kali Linux Tools for Security Testing Part 2 Penetration Testing/Technical


ISO 27002 Foundation- A Practical Approach to Information Security

The course targets individuals who want to equip themselves with knowledge of the various aspects of information security. They will learn the CIA triad, risk analysis, information security incidents and weaknesses, physical measures, technical measures, organizational measures and legislation and regulations.

After the course, the participants will be prepared to take the Information Security Foundation (based on ISO/IEC 27002) certification exam by Exin.

Module 1: Introduction to Information Security

Module 2: Risk Analysis

Module 3: Security Incident Management

Module 4: Security Measures

Module 5: Legislation and Organization

Module 6: Preparing for the ISO 27001 Audit

Web Application Vulnerability Assessment and Penetration Testing

This 1-day course aims to teach security assessment methodology and techniques for individuals or organizations that intend to conduct VAPT for their organization’s applications or consultancy purposes. The course focuses on the organized steps of VAPT, from scoping to reporting and the technical aspects in between. Various tools will be used such as Burp Suite, ZAP, Maltego, Nikto Dirbuster, BeeF etc. that can help assessors in their testing. Vulnerability discovery, exploitation and remediation based on the OWASP Testing Guide will also be discussed.

Module 1: Theoretical Concepts on Web Applications

Module 2: Reconnaissance and Mapping

Module 3: Discovery and Exploitation

Module 4: Preparing for a Security Assessment

Kali Linux Implementation & Administration

This 1-day course aims to teach how to build a working environment using the Kali Linux Distribution. Kali Linux is the primary platform used as a toolkit by ethical hackers in their penetration tests. The course will help the participants become proficient with Kali Linux and explore its features. At the end of the course, the participants will be equipped with the knowledge to setup their own test environment for vulnerability assessment and penetration testing for their respective organizations.

Module 1: Getting Started with Kali Linux

Module 2: Booting and Installing Kali Linux

Module 3: Adding Persistence in Kali Linux

Module 4: Securing and Monitoring Kali Linux

Data Privacy Act of 2012: A Primer

This course aims to provide essential knowledge and to be familiarized with the fundamental principles, terminologies, and legal obligations on the new data privacy law. This workshop also aims to help the participants get started and ensure data privacy compliance.

Module 1: Introduction to Data Privacy Act of 2012 (DPA)

Module 2: Commit to Comply: Appointing a Data Protection Officer (DPO)

Module 3: Know Your Risks: Conduct a Privacy Impact Assessment (PIA)

Module 4: Write Your Plan: Create Your Privacy Management Program/Manual (PMP/PMM)

Module 5: Be Accountable: Implement Privacy and Data Protection (PDP) Measures

Module 6: Be Prepared: Regularly Exercise Your Breach Reporting Procedures (BRP)

A Practical Workshop on Conducting Audit Cycles

Workshop Objectives:
At the end of the workshop, the participants must be able to:

  • Understand the value of audit cycles to an organization
  • Know and understand the Audit Cycle
  • Prepare an Audit Plan
  • Prepare an Audit Checklist
  • Prepare an Audit Report
  • Prepare a Corrective Action Report

Module 1: Audit Cycles and Organizational Maturity

Module 2: The Audit Cycle

Module 3: Audit Cycle Workshop

  • Audit Planning
  • Preparing an Audit Checklist
  • Conducting an Audit
  • Preparing an Audit Report
  • Preparing a Corrective Action Report

Module 4: Audit Cycle Tips and Tricks

Introduction pfSense Administration

Workshop Objectives:

  • Learn the Basic functionalities/modules of pfSense Firewall
  • To be able to setup the pfSense Firewall
  • Create your and apply your own network Policy
  • Apply Security Concepts in pfSense Firewall

Module 1: Introduction To pfSense

  • Linux/Open Source Concepts
  • pfSense Reliability
  • pfSense in Business

Module 2: Let’s Get Started (Setup)

  • pfSense Repository
  • Demo Install Setup (Video)
  • Logging In

Module 3: Discussion of pfSense Default Parameters

  • Admin Configuration
  • pfSense Firewall Server Configuration

Module 4: Router/Switch Configuration

  • Ethernet port Assignments
  • Proper Topology Setup with pfSense Firewall

Module 5: Host Network

  • Assigning IP to Host
  • Static IP for Servers
  • Assigning Domain Names for Hosts

Practical Approach to Cybersecurity Incident Handling

Module 1: Preparation

  • Personnel Roles and Responsibilities
  • Security Training
    • Management
    • Administrators
    • Users
  • Asset Management
  • Tools
  • Project Management
  • Policies, Procedures and Guidelines
  • Documentation and Tracking

Module 2: Identification

  • Event, Incident and Alerts
  • Escalation

Module 3: Containment

  • Management or security team involvement
  • Checklist
  • Technical containment

Module 4: Eradication

  • Indicators of Compromise
  • Removing remnants

Module 5: Recovery

  • System evaluation and validation
  • Monitor continuous activity

Module 6: Lessons Learned

  • Security posture re-evaluation
  • Improvements
    • Capabilities
    • Detection
    • Response

Using Kali Linux Tools for Security Testing Part 1

Workshop Objectives:

  • To enhance cybersecurity knowledge using Kali Linux
  • To spark interest in exploring cybersecurity as a whole

Module 1: Basic Tools

  • Wireshark
  • Burpsuite
  • Nmap
  • Metasploit

Module 2: Social Engineering

  • Beef
  • SET

Using Kali Linux Tools for Security Testing Part 2

Workshop Objectives:

  • To continue exploring tools of Kali Linux
  • To focus more on exploitation tools

Module 1: Network

  • Aircrack-NG
  • Evil Twin

Module 2: Brute Force and Other Attacks

  • Sql Injections
  • THC Hydra
  • John the Ripper
  • Metasploit (other uses)