digital forensics courses south africa | Accredited Africa Training Institute for Capacity Development https://www.aaticd.co.za/tag/digital-forensics-courses-south-africa/ Accredited Africa Training Institute for Capacity Development - Providing International Training Courses in South Africa Fri, 18 Oct 2019 10:14:38 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.4 https://i0.wp.com/www.aaticd.co.za/wp-content/uploads/2022/12/cropped-Accredited-Africa-Training-Institute-for-Capacity-Development-1.png?fit=32%2C32&ssl=1 digital forensics courses south africa | Accredited Africa Training Institute for Capacity Development https://www.aaticd.co.za/tag/digital-forensics-courses-south-africa/ 32 32 121582049 Cyber Security Specialist https://www.aaticd.co.za/course/cyber-security-specialist/ Fri, 18 Oct 2019 10:14:38 +0000 http://aaticd.co.za/?post_type=course&p=1846 Why Attend This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cybersecurity to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking, and black hat hacking. It will also cover WiFi security, Website security, human […]

The post Cyber Security Specialist appeared first on Accredited Africa Training Institute for Capacity Development.

]]>
Why Attend

This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cybersecurity to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking, and black hat hacking.

It will also cover WiFi security, Website security, human factors, cyber forensics, cybersecurity team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) infrastructures.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities.

Course Methodology

The course will include practical sessions, videos as well as live examples [e.g. Virus] and demonstrations of white and black hat hacking tools. All participants will also be provided with the latest research papers and articles.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example of a security incident and identify the best practices which could be applied to secure their own organization and associated assets.

Course Objectives

By the end of the course, participants will be able to:

  • Apply information security standards to their organization and its critical assets
  • Identify the threats presented by viruses, malware, active code, and Active Persistent Threats (APT) and consider the different mitigating options
  • Formulate and manage effective cybersecurity teams, and apply the Computer Security Incident Response Team (CSIRT) framework, tools, and capabilities to deliver cost-effective and robust solutions to protect the organization
  • Use Neuro-Linguistic Programming (NLP) to deliver messages that will change the way employees work and think about security
  • Examine the area of wireless security protocols, their security attributes, and their potential insecurities within the organization, and in public spaces
  • Illustrate how penetration testing and ethical hacking enhance organizational security
  • Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

Target Audience

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/cyber/digital security and seeking to build on their fundamental principles of security.

Target Competencies

  • Information security management
  • Vulnerability assessment and management
  • Applying cybersecurity solutions
  • Developing IT policies and procedures
  • Cyber forensics
  • Ethical hacking and Black Hat hacking

The post Cyber Security Specialist appeared first on Accredited Africa Training Institute for Capacity Development.

]]>
1846
IT Management https://www.aaticd.co.za/it-management/ Tue, 19 Feb 2019 12:37:16 +0000 https://www.aaticd.co.za/?page_id=1313 Click on any of the following IT Management courses to view the details: NB: Details include Training Dates, Course Fees, Course Outline and Targeted Audience, Training Venue etc.

The post IT Management appeared first on Accredited Africa Training Institute for Capacity Development.

]]>
Click on any of the following IT Management courses to view the details:

NB: Details include Training Dates, Course Fees, Course Outline and Targeted Audience, Training Venue etc.

Audio Transcription
Big Data and Data Analytics
Business Intelligence and Data Analysis
Business Intelligence: Data Analysis and Reporting Techniques
Cloud Management and Security: Principles and Best Practice
Consultative and Digital Selling Masterclass
Cyber Security Specialist
Digital Marketing
Digitization and File Management
Electronics Records Management (ERM)
IT Auditing and IT Fraud Detection
IT Disaster Recovery Planning
IT Systems: Identity and Access Management
Library Organisation And Management
Managing IT Projects Effectively

The post IT Management appeared first on Accredited Africa Training Institute for Capacity Development.

]]>
1313