Home » Courses » Information Technology » Cybersecurity Audit Masterclass
10 Days
Training
Date Venue Fees(USD) Book your seat
01 - 12 Sep 2019 Dubai - UAE $9,900 Book Now

The Structure

This comprehensive training course consists of two modules which can be booked as a 10 Day Training event, or as individual, 5 Day training courses.

Module 1 – Cybersecurity Audit Essentials

Module 2 – Auditing a Cybersecurity Programme

The Course Content

Module 1: Cybersecurity Audit Essentials

Day One: IT Security Evolution

  • Categorizing Physical and Electronic Risk
  • Networking and Communication Technology
  • Computer Systems Design
  • Legal and Regulatory Considerations
  • Current Threat and Trend Analysis
  • Review and Case Study 

 

Day Two: Identifying and Responding to Data Breaches - Risk Assessment and Crisis Management

  • IPv6 Configuration and Risks
  • Domain Name System Security Extensions (DNSSEC)
  • Crisis Management Planning
  • Forensic and Electronic investigations
  • Responding to Business Continuity
  • Review and Case Study

 

Day Three: Preparing the Cybersecurity Audit Scope

  • NIST Cybersecurity Framework
  • Cyber incident response policy requirements
  • COBIT 5 framework
  • Audit plan as per the NIST Cybersecurity Framework
  • Audit plan using the COBIT 5 framework
  • Review and Case Study

 

Day Four: Executing the Cybersecurity Audit

  • Using BowTie method for cybersecurity risk management
  • Using AuditXP software for cybersecurity audit
  • Creating NIST Cybersecurity Framework audit questionnaire in AuditXP
  • Creating COBIT 5 framework audit questionnaire in AuditXP
  • Performing the Cybersecurity audit on the example entity
  • Review and Case Study

 

Day Five: Cybersecurity Audit Workshop

  • Forming the team, audit plan and the framework
  • Executing the audit
  • Review of the audit findings
  • Preparing recommendations
  • Discussing the findings and recommendation and their implementation
  • Constant monitoring and upgrade

 

Module 2: Auditing a Cybersecurity Programme

Day Six: Introduction to cybersecurity

  • Vulnerability assessment
  • Threat analysis 
  • Cybersecurity risk assessment
  • Cybersecurity program
  • Cybersecurity risk auditing

 

Day Seven: Inventory Security Management

  • Inventory authorized and unauthorized devices
  • Inventory authorized and unauthorized software
  • Secure configurations
  • Continuous vulnerability assessment and remediation
  • Control use of administrative privileges
  • Maintenance, monitoring and analysis of audit logs

 

Day Eight: Network Security Management

  • Email and web browser protection
  • Malware defenses
  • Security configurations for network devices 
  • Wireless access control
  • Limitation and control of network ports, protocols and services

 

Day Nine: Data Security Management

  • Data protection
  • Controlled data access based on need to know
  • Data recovery capability
  • Boundary defenses
  • Account monitoring and control
  • Security skills assessment and training

 

Day Ten: Security Incident Management

  • Application software security
  • Cybersecurity Incidents
  • Incident response management
  • Penetration tests
  • Red team exercises

The Certificate

  • AZTech Certificate of Completion for delegates who attend and complete the training course

Upcoming Related Courses


DMCA.com Protection Status

© 2019. Material published by AZTech shown here is copyrighted. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.

Send to Colleague

© 2019. Material published by Aztech shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.





Sending your message. Please wait...

Send Successfully

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

Print Page

© 2019. Material published by Aztech shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.



Sending your message. Please wait...

Close

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

Download PDF

© 2019. Material published by Aztech shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.



Sending your message. Please wait...

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

TP 2019

Get a Copy of
Our Latest Training Schedules

Accreditations and Certifications

The PMI Registered Education Provider logo is registered mark of Project Management Institute, Inc.

We're Social follow us on your favorite social media sites


Facebook

Twitter

YouTube

Linkedin

Pinterest