Course Schedule

Get your PDF guide and explore all course details.

Course Modules

This training course is split into the following modules:

Why Choose Cybersecurity Audit Masterclass Training Course?

The Structure

This comprehensive training course consists of two modules which can be booked as a 10 Day Training event, or as individual, 5 Day training courses.

Module 1 – Cybersecurity Audit Essentials

Module 2 – Auditing a Cybersecurity Programme

The Course Content

Day 1

IT Security Evolution

  • Categorizing Physical and Electronic Risk
  • Networking and Communication Technology
  • Computer Systems Design
  • Legal and Regulatory Considerations
  • Current Threat and Trend Analysis
  • Review and Case Study
Day 2

Day Two: Identifying and Responding to Data Breaches - Risk Assessment and Crisis Management

  • IPv6 Configuration and Risks
  • Domain Name System Security Extensions (DNSSEC)
  • Crisis Management Planning
  • Forensic and Electronic investigations
  • Responding to Business Continuity
  • Review and Case Study
Day 3

Day Three: Preparing the Cybersecurity Audit Scope

  • NIST Cybersecurity Framework
  • Cyber incident response policy requirements
  • COBIT 5 framework
  • Audit plan as per the NIST Cybersecurity Framework
  • Audit plan using the COBIT 5 framework
  • Review and Case Study
Day 4

Day Four: Executing the Cybersecurity Audit

  • Using BowTie method for cybersecurity risk management
  • Using AuditXP software for cybersecurity audit
  • Creating NIST Cybersecurity Framework audit questionnaire in AuditXP
  • Creating COBIT 5 framework audit questionnaire in AuditXP
  • Performing the Cybersecurity audit on the example entity
  • Review and Case Study
Day 5

Day Five: Cybersecurity Audit Workshop

  • Forming the team, audit plan and the framework
  • Executing the audit
  • Review of the audit findings
  • Preparing recommendations
  • Discussing the findings and recommendation and their implementation
  • Constant monitoring and upgrade
Day 6

Introduction to Cybersecurity

  • Vulnerability assessment
  • Threat analysis 
  • Cybersecurity risk assessment
  • Cybersecurity program
  • Cybersecurity risk auditing
Day 7

Inventory Security Management

  • Inventory authorized and unauthorized devices
  • Inventory authorized and unauthorized software
  • Secure configurations
  • Continuous vulnerability assessment and remediation
  • Control use of administrative privileges
  • Maintenance, monitoring and analysis of audit logs
Day 8

Network Security Management

  • Email and web browser protection
  • Malware defenses
  • Security configurations for network devices 
  • Wireless access control
  • Limitation and control of network ports, protocols and services
Day 9

Data Security Management

  • Data protection
  • Controlled data access based on need to know
  • Data recovery capability
  • Boundary defenses
  • Account monitoring and control
  • Security skills assessment and training
Day 10

Security Incident Management

  • Application software security
  • Cybersecurity Incidents
  • Incident response management
  • Penetration tests
  • Red team exercises

Certificate and Accreditation

  • AZTech Certificate of Completion for delegates who attend and complete the training course

Do you want to learn more about this course?

Register now or contact our team to discuss schedules, delivery formats, and customised options.

Related Courses

Check out other training courses might interest you

Frequently Asked Questions

Common questions about our training courses

Yes, we offer tailored corporate training solutions to meet your organization's specific needs. Please contact us at [email protected] or call +971 4 427 5400 for more information.

The training fees include full access to the training venue, along with comprehensive training materials to enhance your learning experience. Additionally, participants will be provided with writing supplies and stationery. To ensure comfort and convenience, the fee also covers lunch and refreshing coffee breaks throughout the duration of the course.

Our training programs are hosted at luxurious five-star hotels in prestigious destinations across the globe. Some of our popular locations include Dubai, London, Kuala Lumpur, Amsterdam, New York, Paris, Vienna, and many other iconic cities.

There are several convenient ways to register for our training programs:

  • Online: Explore our training calendar, choose the course that suits your needs, and click the “Register Now” button on the course details page.
  • Email: Share your details, including your name, organization, email address, and selected course, by sending an email to  [email protected]
  • Phone: Reach out to us directly at +971 4 427 5400 or +971 4 427 5407, and our team will guide you through the registration process.

Once your registration is successfully completed, you will receive a confirmation email within 24 hours. This email will contain your registration details, invoice, and the necessary joining instructions for the course.

Related Categories