Advanced Persistent Threat or Intrusion

Workshop ID: ADVANCp6H2

Objective

Cyber threat is the area every management must know. An Advanced Persistent threat (APT) is a broad term used to describe:
   - Attack strategy against specific targets by a cybercriminals
   - Involves long term presence in the targeted computer systems
   - Includes gaining access to the network to acquire highly sensitive data

The course provides a high-level introduction for the management to initiate the proper action in the strategic direction, protect information assets, highly sensitive data, and take vital steps to protect privacy data.

    Price: $0 $74.99
    Add to Cart For Corporate Request Demo →
    • Category: Free Workshop
    • Duration: 9 Mins
    • CPE: 1 HR
    • Workshop Type: e-Learning

    What you will learn:


      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      What is Advanced Persistent Threat
      Phases of an Advanced Persistent Threat
      Reconnaissance and Initial Access
      Expand Access
      Data Capture/Exfiltration or Manipulation
      Track-Covering and Exit
      The suggested e-Learning courses that would reduce the insurance cost

    Advanced Persistent Threat or Intrusion

    • Course ID: ADVANCp6H2
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:


    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Advanced Persistent Threat
    Phases of an Advanced Persistent Threat
    Reconnaissance and Initial Access
    Expand Access
    Data Capture/Exfiltration or Manipulation
    Track-Covering and Exit
    The suggested e-Learning courses that would reduce the insurance cost

    Anti Money Laundering (AML) Awareness

    • Course ID: CO00103
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What it is and how does it work?
    • Why people and organizations launder money?
    • How money laundering works: basic process
    • Legal consequences for money laundering, including state and federal (U.S.) penalties
    • Applicable laws and regulation
    • Insider trading

    Architectural Solutions

    • Course ID: ARCHITvD8Q
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:


    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    Securing ICS Infrastructure - Defense in Depth
    Next-Gen Tools and Techniques
    Zero Trust

    Asset Management

    • Course ID: FCOO102
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What you will learn:
      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      What is Asset Management?
      Asset Management and Cybersecurity
      Recommendations for Asset Management
      Case Study - Application/Program Vulnerabilities 

    Backup and Recovery

    • Course ID: FCOO104
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What you will learn:
      The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      What is a disaster?
      What is Disaster Recovery?
      Backup and Recovery
      Protecting Backup Data

    Breach Management

    • Course ID: FCOO105
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    What you will learn:

     

    The training promotes the objectiveof informed management for better decision-making. raining provides managementand employees with a basic understanding of underlying concepts and recommendationsfor managing challenges. Each section informed you about additional trainingrequirements and recommended courses. In the next 10minutes, you will learn:

    • What is the importance of abreach notification?
    • What is a data breach?
    • In what circumstances wouldnotification of a data breach be required and to whom?
    • Suggested e-Learning courses toenhance the knowledge.

    (Note - The suggested e-Learningprogram is a two-part series.)

    Breach Notification Part I - Awareness

    • Course ID: CS00301
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • What is the importance of a breach notification?
    • What is a data breach?
    • In what circumstances would notification of a data breach be required and to whom?
    • When and how should notification of a data breach be provided?
    • Framework for Effective Data Breach Notification Legislation
    • Timing of Notification to Affected Individuals
    • Post Data Breach Immediate Action Items
    • Breach Notification to Authorities

    Breach Notification Part II - Advanced

    • Course ID: CS00302
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • Breach Management
    • Effective Breach Response
    • Data Breach Checklist
    • Breach Notification Notice Content
    • Notification Timelines
    • Lifecycle of a Data Breach
    • Public Relations Strategy

    Bring Your Own Device

    • Course ID: FCOO106
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    1. What you will learn:
      The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

      What is Bring Your Own Device (BYOD)?
      What are the BYOD challenges?
      How can you secure your BYOD environment?
      Examples of BYOD device hack
      Suggested e-Learning courses to enhance the knowledge
      (Note - The suggested e-Learning program is a two-part series.)

    Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

    • Course ID: DR00101
    • CPE: 1 HR
    • Course Type: e-Learning
    Book the course Course Objective

    What you will learn:

    • Disaster
    • Business Continuity and Disaster Recovery
    • Use Cases
    • Risks Covered by DR
    • Driving Factors
    • Challenges in Developing DR Plan
    • Technical Challenges
    • Key Factors in DR Plan
    Need us to design a course for you? Contact Now
    Copyrights © 2020 All Rights Reserved by SecuRetain.