...

Cyber Security Training Courses

AI Cyber Workshop

Main Training Goal

The trainees will use AI chats to analyze, detect and mitigate suspicious activity in a controlled environment. The trainees will find the flag in the Gandalf challenge.

Target Audience

  • IT/OT Professional
  • Incident Response Team Member
  • SOC Analyst
  • CISO – Chief Information Security Office


Mandatory Prerequisites

IT background

Training Outcomes
Ability to use AI engines as an assisting tool in cyber security.

Awareness - Management

Main Training Goal

The trainees:

  • will understand the attacker point of view
  • will understand the flow of an APT on an organization
  • will be aware to the
  • will deal with management decisions that will come up in future attacks on their organizations


Target Audience

  • Decision Makers
  • CISO – Chief Information Security Officer
  • Executive Leadership (CEO, Board of Directors)
  • Senior Management (C/V-level)


Mandatory Prerequisites
None


Training Outcomes

  • The trainee will get familiar with the internal processes and stages of a cyber attack, and learn the correct usage and the theory behind the tools utilized for performing Cyber Forensics in a complex environment.
  • Acquire insights into a hacker’s perspective and mindset through live cyberattacks
  • Understand the importance of and gain insights into managing a crisis with the relevant key players, both technical and managerial

Cyber Crisis Management

Main Training Goal

The trainees will experience and discuss the ways to manage a cyber incident in their organization.

Target Audience

  • Executive Leadership (CEO, Board of Directors)
  • Senior Management (C/V-level)
  • CISO – Chief Information Security Officer


Mandatory Prerequisites

None

Training Outcomes

  • Acquire the theoretical knowledge and gain the first-hand experience required to successfully manage a cybersecurity incident from a managerial perspective
  • Acquire critical knowledge required to successfully manage a cyber crisis

Cyber Forensics Overview

Main Training Goal

Understanding the internal processes, mechanisms, and stages of malware execution – as it is performed by real-world hackers. Getting familiar with the key tools and techniques required in order to perform Cyber Evidence collection and initial forensics. Getting a real-life hands-on experience of collecting evidence and performing forensic investigation during an actual cyber attack in the Cyber Arena environment.

Target Audience
Junior IT employees

Mandatory Prerequisites
None

Training Outcomes
The trainee will get familiar with the internal processes and stages of a cyber attack, and learn the correct usage and the theory behind the tools utilized for performing Cyber Forensics in a complex environment.

Cyber-Threats and Defense - Essential Tools

Main Training Goal
Learning to use and understand the purpose and operation of the main tools used by Cyber Security professionals in order to investigate an Incident, collect initial evidence, and prepare the required materials and information for the advanced Incident Response teams operation.

Target Audience

  • Junior IT employees
  • Incident Response Team Member


Mandatory Prerequisites
IT background

Training Outcomes

  • The trainee will get the initial skills and tools acquaintance required in order to perform Cyber Incident investigation and evidence collection.
  • Ability to analyze malwares in a system
  • Ability to analyze and investigate a hacked system

Cyber-Threats and Defense Essentials - Level 1

Main Training Goal

The trainees will exercise on malwares detection and analysis. The trainees will detect, analyze and handle an cyber incident

Target Audience

  • Incident Response Team Member
  • IT/OT Professional


Mandatory Prerequisites

IT background

Training Outcomes

  • Acquire the initial theoretical background and skills required to perform cyber incident investigations and evidence collection
  • Gain familiarity with and working knowledge of cybersecurity investigation and monitoring tools

Cyber-Threats and Defense Essentials - Level 2

Main Training Goal

  • The trainees will exercise on malwares detection and analysis
  • The trainees will detect, analyze and handle an cyber incident

Target Audience

  • Incident Response Team Member
  • IT/OT Professional


Mandatory Prerequisites

  • IT background
  • Cyber-Threats and Defense Essentials – Level 1


Training Outcomes

  • Acquire the initial theoretical background and skills required to perform cyber incident investigations and evidence collection
  • Gain familiarity with and working knowledge of cybersecurity investigation and monitoring tools
  • Acquire critical knowledge required to successfully manage a cyber crisis

Cyber-Threats and Defense Essentials Distribution

Main Training Goal

  • The trainees will describe the cyber security concepts.
  • The trainees will detect and analyze malwares in the environment using the Wireshark.
  • The trainees will manage and handle APTs in the OT environment.


Target Audience

  • IT/OT Professional
  • Tier 1 Security Analyst
  • Incident Response Team
  • Junior OT security personnel in process of qualification
  • Technical personnel in the fields of OT


Mandatory Prerequisites
OT background

Training Outcomes

  • Acquire the theoretical knowledge and practical experience required to monitor and protect critical distribution infrastructure in an OT-based organization
  • Ability to analyze and investigate a hacked system
  • Ability to analyze malwares in a system using Wireshark

Incident Response - Principal Tactics (OT Distribution)

Main Training Goal

The trainees learn the required theory of and perform practical exercises in organizational cyber-threat incident response processes, gaining familiarity with some of the key concepts and tools in the field:

  • Managing corporate security policies and standards compliance
  • Developing and updating organizational policies and procedures
  • Evaluating the magnitude of damage and managing responsibilities
  • Detecting and mitigating an ongoing cyber-attack under real-life APT conditions

The training tools, materials and experiences are optimized for the unique components and considerations of the ICS environment.

Target Audience

  • Incident Response Team Member
  • IT/OT Professional
  • Technical personnel in the fields of OT


Mandatory Prerequisites

  • OT background
  • Basic background knowledge of information security concepts and solutions


Training Outcomes

Acquire the necessary expertise, methodology and practical experience required to become a skilled First Responder or Incident Response team member in organizations that utilize ICS or OT systems.

Incident Response - Principal Tactics (OT)

Main Training Goal

The trainees learn the required theory of and perform practical exercises in organizational cyber-threat incident response processes, gaining familiarity with some of the key concepts and tools in the field:

  • Managing corporate security policies and standards compliance
     Developing and updating organizational policies and procedures
  • Evaluating the magnitude of damage and managing responsibilities
  • Detecting and mitigating an ongoing cyber-attack under real-life APT conditions

The training tools, materials and experiences are optimized for the unique components and considerations of the ICS environment.

Target Audience

  • Incident Response Team Member
  • Incident response teams
  • IT/OT Professional
  • Junior OT security personnel in process of qualification


Mandatory Prerequisites

Basic background knowledge of information security concepts and solutions

Training Outcomes
Acquire the necessary expertise, methodology and practical experience required to become a skilled First Responder or Incident Response team member in organizations that utilize ICS or OT systems.

Incident Response - Principal Tactics

Main Training Goal

  • The trainees will detect and analyze and mitigate malwares in a controlled environment
  • The trainees will manage and handle a real-live APT

Target Audience

  • Incident Response Team Member
  • IT/OT Professional
  • Junior IT employees
  • SOC Analyst


Mandatory Prerequisites

  • Understanding of basic information security concepts and tools
  • Familiarity with networking principles, architecture and protocols
  • Knowledge of computer and operating system architectures and internals
  • IT background


Training Outcomes

  • Acquire the necessary expertise, methodology and practical experience required to become a skilled First Responder or Incident Response team member in organizations of all sizes
  • Ability to analyze and investigate a hacked system

IR Skills Refresher (IT) – Level 1

Main Training Goal

The trainees will detect, analyze and handle a real-live APT

  Target Audience

  • IT/OT Professional
    • Junior IT employees
    •    SOC Analyst
    •    Incident Response Team Member


Mandatory Prerequisites

  • IR principal Tactics training
    • IT background


Training Outcomes

Ability to analyze and investigate a hacked system

IR Skills Refresher (IT) – Level 2

Main Training Goal

The trainees will detect, analyze and handle a real-live advanced APT

Target Audience

  • IT/OT Professional
    • Junior IT employees
    •    SOC Analyst
    •    Incident Response Team Member

 
Mandatory Prerequisites

  • IR principal Tactics training
    • IT background
    •    IR advanced Tactics training


Training Outcomes

Ability to analyze and investigate a hacked system

IR Skills Refresher (IT) – Level 3

Main Training Goal

The trainees will detect, analyze and handle a real-live APT

 Target Audience

  • IT/OT Professional
    • Junior IT employees
    •    SOC Analyst
    •    Incident Response Team Member

 
Mandatory Prerequisites

  • IR principal Tactics training
    • IT background
    •    IR advanced Tactics training


Training Outcomes

Ability to analyze and investigate a hacked system

OT Awareness - Management

Main training goal

  • The trainees will gain understanding of the hacker POV
  • The trainees will understand the concept of the IR team
  • The trainees will experience a live APT in the OT sector


Target Audience

  • IT/OT Professional
    • CISO – Chief Information Security Officer
    •    Decision Makers
    •    Executive Leadership (CEO, Board of Directors)
    •    Technical personnel in the fields of OT


Mandatory Prerequisites
Be familiar with general networking principles, architecture and protocols

Training Outcomes

  • Gain understanding and knowledge of the latest security developments in cyberspace
  • Experience all stages of a complex cyberattack targeted against organizations

OT Cyber Security Essentials(7 days) - Part 1

Main training goal

The trainees will detect and analyze malwares in class with the tools they will learn and receive in the training
The trainees will detect, analyze and handle an APT in the arena

Target Audience

  • Junior OT security personnel in process of qualification
    • IT/OT Professional
    •    Junior IT employees
    •    Tier 1 Security Analyst


Mandatory Prerequisites

  • Be familiar with computer and Operating Systems architecture and internals
    • Be familiar with general networking principles, architecture and protocols


Training Outcomes

Acquiring theoretical knowledge and first-hand experience in monitoring and protecting critical infrastructure in an OT-centric organization.

OT Cyber Security Essentials(7 days) - Part 2

Main training goal

The trainees will detect, analyze and mitigate malwares in a controlled environment.
The trainees will experience and handle a real live APT in the OT environment.

Target Audience

Junior OT security personnel in process of qualification

Mandatory Prerequisites

  • Be familiar with computer and Operating Systems architecture and internals
  • Be familiar with general networking principles, architecture and protocols


Training Outcomes

  • Acquiring theoretical knowledge and first-hand experience in monitoring and protecting critical infrastructure in an OT-centric organization.
  • Ability to analyze malwares in a system
  • Ability to analyze and investigate a hacked system

1-day Advanced Persistent Threat Guided (OT)

Main Training Goal

The trainee will experience a rapid APT Session
The trainee will raise his awareness to cyber attacks

Target Audience

  • Decision Makers
    • CISO – Chief Information Security Officer


Mandatory Prerequisites

None

Training Outcomes

Awareness of new variant of scams and cyber attacks

Workshop Cyber AI

For registration, please fill out the form.

Awareness - Management

For registration, please fill out the form.

Cyber Crisis Management

For registration, please fill out the form.

Cyber Forensics Overview

For registration, please fill out the form.

Cyber-Threats and Defense - Essential Tools

For registration, please fill out the form.

Cyber-Threats and Defense Essentials - Level 1

For registration, please fill out the form.

Cyber-Threats and Defense Essentials - Level 2

For registration, please fill out the form.

Cyber-Threats and Defense Essentials Distribution

For registration, please fill out the form.

Incident Response - Principal Tactics (OT Distribution)

For registration, please fill out the form.

Incident Response - Principal Tactics (OT)

For registration, please fill out the form.

Incident Response - Principal Tactics

For registration, please fill out the form.

IR Skills Refresher (IT) – Level 1

For registration, please fill out the form.

IR Skills Refresher (IT) – Level 2

For registration, please fill out the form.

IR Skills Refresher (IT) – Level 3

For registration, please fill out the form.

OT Awareness - Management

For registration, please fill out the form.

OT Cyber Security Essentials
(7 days) - Part 1

For registration, please fill out the form.

OT Cyber Security Essentials
(7 days) - Part 2

For registration, please fill out the form.

1-day Advanced Persistent Threat Guided (OT)

For registration, please fill out the form.

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.