Cyber Security Training Courses
AI Cyber Workshop
Main Training Goal
The trainees will use AI chats to analyze, detect and mitigate suspicious activity in a controlled environment. The trainees will find the flag in the Gandalf challenge.
Target Audience
- IT/OT Professional
- Incident Response Team Member
- SOC Analyst
- CISO – Chief Information Security Office
Mandatory Prerequisites
IT background
Training Outcomes
Ability to use AI engines as an assisting tool in cyber security.
Awareness - Management
Main Training Goal
The trainees:
- will understand the attacker point of view
- will understand the flow of an APT on an organization
- will be aware to the
will deal with management decisions that will come up in future attacks on their organizations
Target Audience
- Decision Makers
- CISO – Chief Information Security Officer
- Executive Leadership (CEO, Board of Directors)
- Senior Management (C/V-level)
Mandatory Prerequisites
None
Training Outcomes
- The trainee will get familiar with the internal processes and stages of a cyber attack, and learn the correct usage and the theory behind the tools utilized for performing Cyber Forensics in a complex environment.
- Acquire insights into a hacker’s perspective and mindset through live cyberattacks
- Understand the importance of and gain insights into managing a crisis with the relevant key players, both technical and managerial
Cyber Crisis Management
Main Training Goal
The trainees will experience and discuss the ways to manage a cyber incident in their organization.
Target Audience
- Executive Leadership (CEO, Board of Directors)
- Senior Management (C/V-level)
- CISO – Chief Information Security Officer
Mandatory Prerequisites
None
Training Outcomes
- Acquire the theoretical knowledge and gain the first-hand experience required to successfully manage a cybersecurity incident from a managerial perspective
- Acquire critical knowledge required to successfully manage a cyber crisis
Cyber Forensics Overview
Main Training Goal
Understanding the internal processes, mechanisms, and stages of malware execution – as it is performed by real-world hackers. Getting familiar with the key tools and techniques required in order to perform Cyber Evidence collection and initial forensics. Getting a real-life hands-on experience of collecting evidence and performing forensic investigation during an actual cyber attack in the Cyber Arena environment.
Target Audience
Junior IT employees
Mandatory Prerequisites
None
Training Outcomes
The trainee will get familiar with the internal processes and stages of a cyber attack, and learn the correct usage and the theory behind the tools utilized for performing Cyber Forensics in a complex environment.
Cyber-Threats and Defense - Essential Tools
Main Training Goal
Learning to use and understand the purpose and operation of the main tools used by Cyber Security professionals in order to investigate an Incident, collect initial evidence, and prepare the required materials and information for the advanced Incident Response teams operation.
Target Audience
- Junior IT employees
- Incident Response Team Member
Mandatory Prerequisites
IT background
Training Outcomes
- The trainee will get the initial skills and tools acquaintance required in order to perform Cyber Incident investigation and evidence collection.
- Ability to analyze malwares in a system
- Ability to analyze and investigate a hacked system
Cyber-Threats and Defense Essentials - Level 1
Main Training Goal
The trainees will exercise on malwares detection and analysis. The trainees will detect, analyze and handle an cyber incident
Target Audience
- Incident Response Team Member
- IT/OT Professional
Mandatory Prerequisites
IT background
Training Outcomes
- Acquire the initial theoretical background and skills required to perform cyber incident investigations and evidence collection
- Gain familiarity with and working knowledge of cybersecurity investigation and monitoring tools
Cyber-Threats and Defense Essentials - Level 2
Main Training Goal
- The trainees will exercise on malwares detection and analysis
- The trainees will detect, analyze and handle an cyber incident
Target Audience
- Incident Response Team Member
- IT/OT Professional
Mandatory Prerequisites
- IT background
- Cyber-Threats and Defense Essentials – Level 1
Training Outcomes
- Acquire the initial theoretical background and skills required to perform cyber incident investigations and evidence collection
- Gain familiarity with and working knowledge of cybersecurity investigation and monitoring tools
- Acquire critical knowledge required to successfully manage a cyber crisis
Cyber-Threats and Defense Essentials Distribution
Main Training Goal
- The trainees will describe the cyber security concepts.
- The trainees will detect and analyze malwares in the environment using the Wireshark.
- The trainees will manage and handle APTs in the OT environment.
Target Audience
- IT/OT Professional
- Tier 1 Security Analyst
- Incident Response Team
- Junior OT security personnel in process of qualification
- Technical personnel in the fields of OT
Mandatory Prerequisites
OT background
Training Outcomes
- Acquire the theoretical knowledge and practical experience required to monitor and protect critical distribution infrastructure in an OT-based organization
- Ability to analyze and investigate a hacked system
- Ability to analyze malwares in a system using Wireshark
Incident Response - Principal Tactics (OT Distribution)
Main Training Goal
The trainees learn the required theory of and perform practical exercises in organizational cyber-threat incident response processes, gaining familiarity with some of the key concepts and tools in the field:
- Managing corporate security policies and standards compliance
- Developing and updating organizational policies and procedures
- Evaluating the magnitude of damage and managing responsibilities
- Detecting and mitigating an ongoing cyber-attack under real-life APT conditions
The training tools, materials and experiences are optimized for the unique components and considerations of the ICS environment.
Target Audience
- Incident Response Team Member
- IT/OT Professional
- Technical personnel in the fields of OT
Mandatory Prerequisites
- OT background
- Basic background knowledge of information security concepts and solutions
Training Outcomes
Acquire the necessary expertise, methodology and practical experience required to become a skilled First Responder or Incident Response team member in organizations that utilize ICS or OT systems.
Incident Response - Principal Tactics (OT)
Main Training Goal
The trainees learn the required theory of and perform practical exercises in organizational cyber-threat incident response processes, gaining familiarity with some of the key concepts and tools in the field:
- Managing corporate security policies and standards compliance
Developing and updating organizational policies and procedures - Evaluating the magnitude of damage and managing responsibilities
- Detecting and mitigating an ongoing cyber-attack under real-life APT conditions
The training tools, materials and experiences are optimized for the unique components and considerations of the ICS environment.
Target Audience
- Incident Response Team Member
- Incident response teams
- IT/OT Professional
- Junior OT security personnel in process of qualification
Mandatory Prerequisites
Basic background knowledge of information security concepts and solutions
Training Outcomes
Acquire the necessary expertise, methodology and practical experience required to become a skilled First Responder or Incident Response team member in organizations that utilize ICS or OT systems.
Incident Response - Principal Tactics
Main Training Goal
- The trainees will detect and analyze and mitigate malwares in a controlled environment
- The trainees will manage and handle a real-live APT
Target Audience
- Incident Response Team Member
- IT/OT Professional
- Junior IT employees
- SOC Analyst
Mandatory Prerequisites
- Understanding of basic information security concepts and tools
- Familiarity with networking principles, architecture and protocols
- Knowledge of computer and operating system architectures and internals
- IT background
Training Outcomes
- Acquire the necessary expertise, methodology and practical experience required to become a skilled First Responder or Incident Response team member in organizations of all sizes
- Ability to analyze and investigate a hacked system
IR Skills Refresher (IT) – Level 1
Main Training Goal
The trainees will detect, analyze and handle a real-live APT
Target Audience
- IT/OT Professional
• Junior IT employees
• SOC Analyst
• Incident Response Team Member
Mandatory Prerequisites
- IR principal Tactics training
• IT background
Training Outcomes
Ability to analyze and investigate a hacked system
IR Skills Refresher (IT) – Level 2
Main Training Goal
The trainees will detect, analyze and handle a real-live advanced APT
Target Audience
- IT/OT Professional
• Junior IT employees
• SOC Analyst
• Incident Response Team Member
Mandatory Prerequisites
- IR principal Tactics training
• IT background
• IR advanced Tactics training
Training Outcomes
Ability to analyze and investigate a hacked system
IR Skills Refresher (IT) – Level 3
Main Training Goal
The trainees will detect, analyze and handle a real-live APT
Target Audience
- IT/OT Professional
• Junior IT employees
• SOC Analyst
• Incident Response Team Member
Mandatory Prerequisites
- IR principal Tactics training
• IT background
• IR advanced Tactics training
Training Outcomes
Ability to analyze and investigate a hacked system
OT Awareness - Management
Main training goal
- The trainees will gain understanding of the hacker POV
- The trainees will understand the concept of the IR team
- The trainees will experience a live APT in the OT sector
Target Audience
- IT/OT Professional
• CISO – Chief Information Security Officer
• Decision Makers
• Executive Leadership (CEO, Board of Directors)
• Technical personnel in the fields of OT
Mandatory Prerequisites
Be familiar with general networking principles, architecture and protocols
Training Outcomes
- Gain understanding and knowledge of the latest security developments in cyberspace
- Experience all stages of a complex cyberattack targeted against organizations
OT Cyber Security Essentials(7 days) - Part 1
Main training goal
The trainees will detect and analyze malwares in class with the tools they will learn and receive in the training
The trainees will detect, analyze and handle an APT in the arena
Target Audience
- Junior OT security personnel in process of qualification
• IT/OT Professional
• Junior IT employees
• Tier 1 Security Analyst
Mandatory Prerequisites
- Be familiar with computer and Operating Systems architecture and internals
• Be familiar with general networking principles, architecture and protocols
Training Outcomes
Acquiring theoretical knowledge and first-hand experience in monitoring and protecting critical infrastructure in an OT-centric organization.
OT Cyber Security Essentials(7 days) - Part 2
Main training goal
The trainees will detect, analyze and mitigate malwares in a controlled environment.
The trainees will experience and handle a real live APT in the OT environment.
Target Audience
Junior OT security personnel in process of qualification
Mandatory Prerequisites
- Be familiar with computer and Operating Systems architecture and internals
- Be familiar with general networking principles, architecture and protocols
Training Outcomes
- Acquiring theoretical knowledge and first-hand experience in monitoring and protecting critical infrastructure in an OT-centric organization.
- Ability to analyze malwares in a system
- Ability to analyze and investigate a hacked system
1-day Advanced Persistent Threat Guided (OT)
Main Training Goal
The trainee will experience a rapid APT Session
The trainee will raise his awareness to cyber attacks
Target Audience
- Decision Makers
• CISO – Chief Information Security Officer
Mandatory Prerequisites
None
Training Outcomes
Awareness of new variant of scams and cyber attacks