+974 55756360 info@daadconsulting.com

Cyber Security Training

Training Introduction:

The Foundation training is aimed at IT professionals. The goal is to equip them with a baseline level of expertise
and knowledge of cyber security such that they can minimize risks as part of their day-to-day work. Laying the foundations of information security and gaining a broad understanding of why it is important. Understand what
constitutes an incident and how to escalate it appropriately. Aware of the role of logging and disasters, backups, redundancy, etc.

Security Overview :

What does security mean to you?
Technology, people and processes CIA triad IT &OT Cyber controls.

Cybersecurity Governance:

Introduction to holistic risk management Security frameworks. Ensuring compliance & security data Risk assessment and analysis Threat modelling basics

Incident Detection and Escalation:

  • Introduction to incidents
  • Types of incidents
  • Anatomy of an attack
  • Security operations


Business Continuity Planning:

  • Business continuity
  • Disaster recovery
  • Protection mechanisms

Fundamentals of networking and sysadmin endpoint protection for users. Application and software fundamentals and understanding the implications of what has been learned so far in a cloud environment. Also miscellaneous security principles including cryptographic systems, the importance of IAM and physical security, including buildings

Network Security:

  • Introduction to networks
  • Data security
  • Network security
  • Ancillary networks
  • Network design workshop

Endpoint Security

  • Protection of data
  • User security
  • Why Endpoint Security Matters
  • Administrative Security

Application Security:

  • Introduction to Applications
  • Securing Applications
  • SDLC
  • Gold builds & server hardening

Cloud Security:

  • Cloud architecting introduction
  • Choosing the right vendor

Application and software fundamentals and understanding the implications of what has been learned so far in a cloud
environment. Also miscellaneous security principles including cryptographic systems, the importance of IAM
and physical security, including buildings.

Identity and Access Management

  • IAAA
  • Authentication mechanisms
  • Typical attacks
  • IAM lifecycles

DevSecOps:

  • Introduction to DevOps and basic
  • terminology
  • Achieving Secure Development Lifecycle
  • (SDLC)
  • Achieving proactive security
  • Achieving visibility and change
  • management