Nigerian Seminars and Trainings

Search all upcoming seminars, conferences, short management courses and training in Nigeria and around the World

business logo

Training Course on Applied Cybersecurity

By: Datastat Research Center

Kenya

05 - 09 Sep, 2022  5 days

Follow Event

  

USD 900

Venue: Nairobi

Other Dates

Venue Date Fee  
Nairobi, Kenya 10 - 14 Oct, 2022 USD900
Nairobi, Kenya 07 - 11 Nov, 2022 USD900
Nairobi, Kenya 05 - 09 Dec, 2022 USD900
Nairobi, Kenya, Kenya 09 - 13 Jan, 2023 USD900
Nairobi, Kenya 06 - 10 Feb, 2023 USD900

In today’s world, organizations must be prepared to defend against threats in cyberspace. Decision makers must be familiar with the basic principles and best practices of cybersecurity to best protect their enterprises. In this course, experts from academia, the military, and industry share their knowledge to give participants the principles, the state of the practice, and strategies for the future.

Sessions will address information security, ethical and legal practices, and mitigating cyber vulnerabilities. Participants will also learn about the process of incident response and analysis. The content is targeted at ensuring the privacy, reliability, and integrity of information systems.

The majority of the course (about 75%) is geared toward participants at the decision-making level who need a broad overview, rather than those who are already deeply immersed in the technical aspects of cybersecurity (software development, digital forensics, etc.), although both groups will find the course valuable.

Cybersecurity is a very large subject, and therefore this course is only intended to cover the basics of the current leading and pressing cybersecurity topics. The result is that we can cover many different approaches. We cover the introduction of a topic and after the fundamentals, you can explore further on your own. The goal is for participants to understand the utility of each topic, not to become specialists in any one subject.

Course Objectives

The participants of this course will be able to:

  • Secure both clean and corrupted systems, protecting personal data, securing simple computer networks, and safe Internet usage
  • Understand key terms and concepts in cyber law, intellectual property and cyber-crimes, trademarks, and domain theft
  • Determine computer technologies, digital evidence collection, and evidentiary reporting in forensic acquisition
  • Incorporate approaches to secure networks, firewalls, intrusion detection systems, and intrusion prevention systems
  • Examine secure software construction practices
  • Understand principles of web security
  • Incorporate approaches for incident analysis and response
  • Incorporate approaches for risk management and best practices

Who should attend?

Seventy-five percent of the course is geared toward providing a basic framework for professionals making cybersecurity decisions in industry and government and individuals seeking to immerse themselves in the pressing issues of cybersecurity, giving them the information, they need to make the best decisions for the defence of their organizations. About a quarter of the course covers more technical areas of interest to people with more engineering-focused backgrounds, such as software developers or those working in digital forensics. Although those with a computing background would be better prepared for the more technical topics, an engineering or computing background is not required to benefit from any of the sessions.

Duration

5 days

Course Outline

Please note that the exact nature and order of the topics is subject to change.

1. Introduction to Information Security Fundamentals and Best Practices

  • Protecting Your Computer and its Contents
  • Securing Computer Networks--Basics of Networking
  • Compromised Computers
  • Secure Communications and Information Security Best Practices
  • Privacy Guidelines
  • Safe Internet Usage

2. Ethics in Cybersecurity and Cyber Law

  • Privacy
  • Intellectual Property
  • Professional Ethics
  • Freedom of Speech
  • Fair User and Ethical Hacking
  • Trademarks
  • Internet Fraud
  • Electronic Evidence
  • Cybercrimes

3. Forensics

  • Forensic Technologies
  • Digital Evidence Collection
  • Evidentiary Reporting

4. Network Assurance

  • Layered Defense
  • Surveillance and Reconnaissance
  • Outsider Thread Protection

5. Secure Software and Browser Security

  • Software Construction
  • Software Design and Architecture
  • Software Testing
  • Methodologies
  • The New Universal Client
  • The Web Model
  • Cookies and Browser Storage
  • HTML5 Security

6. Business Information Continuity

  • Managing a Business Information Continuity Plan
  • Vulnerabilities and Controls
  • The Law and Business Information Continuity Plan

7. Information Risk Management

  • Asset Evaluation and Business Impact Analysis
  • Risk Identification
  • Risk Quantification
  • Risk Response Development and Control
  • Security Policy, Compliance, and Business Continuity

8. Cyber Incident Analysis and Response

  • Incident Preparation
  • Incident Detection and Analysis
  • Containment, Eradication, and Recovery
  • Proactive and Post-Incident Cyber Services

Methodology

The instructor led trainings are delivered using a blended learning approach and comprises of presentations, guided sessions of practical exercise, web-based tutorials, and group work. Our facilitators are seasoned industry experts with years of experience, working as professional and trainers in these fields.

Key Notes

  • The participant must be conversant with English.
  • Upon completion of training the participant will be issued with an Authorized Training Certificate.
  • Course duration is flexible, and the contents can be modified to fit any number of days.
  • The course fee includes facilitation training materials, 2 coffee breaks, buffet lunch and A Certificate upon successful completion of Training.
  • One-year post-training support Consultation and Coaching provided after the course.
  • Payment should be done at least a week before commencing of the training, to DATASTAT CONSULTANCY LTD account, as indicated in the invoice so as to enable us to prepare better for you.
Nairobi Sep 05 - 09 Sep, 2022
Nairobi, Kenya 10 - 14 Oct, 2022
Nairobi, Kenya 07 - 11 Nov, 2022
Nairobi, Kenya 05 - 09 Dec, 2022
Nairobi, Kenya, Kenya 09 - 13 Jan, 2023
Nairobi, Kenya 06 - 10 Feb, 2023

Registration: 08:40:am - 11:55:am

USD 900.00
(Convert Currency)

Sammy +254 724527104

Deal
Data Stat Research

Related Courses

Training Course on Cspro for Android and Smartphones Training Course on Cspro for Android and Smartphones

5 days, 12 - 16 Sep, 2022 

2022-09-12 12:09:00 2022-09-12 12:09:00
Kenya

Datastat Research Center

This course will focus on building CAPI (Computer Assisted Personal Interviewing) applications for enumeration using Android tablets and Smartphone’s’. Participants will learn about ways ...

Training Course on Leveraging the Generation Gap Training Course on Leveraging the Generation Gap

5 days, 05 - 09 Sep, 2022 

2022-09-05 12:09:00 2022-09-05 12:09:00
Kenya

Datastat Research Center

This course will help you understand the various generations present at work and understand what motivates each of them and how to work together. While having various cultures in one workplace can ...

Training Course on Population Change and Public Health Training Course on Population Change and Public Health

5 days, 05 - 09 Sep, 2022 

2022-09-05 12:09:00 2022-09-05 12:09:00
Kenya

Datastat Research Center

This course introduces the basic elements of population studies, including: population size, composition, and distribution, and the causes and consequences of changes in these characteristics. An ...

Training Course on Manager's Role in Capacity Building Training Course on Manager's Role in Capacity Building

5 days, 05 - 09 Sep, 2022 

2022-09-05 12:09:00 2022-09-05 12:09:00
Kenya

Datastat Research Center

Capacity development is a series of strategies, a variety of tools and techniques which, when applied in a systematic way, promote both organizational capacity building and institutional development. ...