Course Outline
Welcome & Introduction - Course overview and objectives
The Information Security Landscape
- Defining information security: Confidentiality, Integrity, Availability (CIA triad)
- Data classifications and sensitivity levels
- Understanding common cyber threats (malware, phishing, social engineering, etc.)
- Real-world case studies of information security breaches
Building Your Information Security Arsenal
- Essential security controls: Access control, encryption, firewalls, intrusion detection
- Implementing secure practices: Password management, multi-factor authentication (MFA), data backups
- Understanding security frameworks and standards (NIST, ISO 27001)
Navigating the Information Security Career Landscape
- Overview of the diverse career paths available (Security Management, Governance, Risk and Compliance (GRC), Security Analyst, Penetration Tester, Incident Responder, etc.)
- Understanding the skills and qualifications required for different roles
- Exploring educational and certification options
- Q&A with industry professionals (optional)
Specialising in the Security Realm
- Deep dive into specific security domains: Network security, cloud security, application security, data security
- Emerging trends and future directions in information security - AI, Culture Change
- Career growth and advancement opportunities
Hands-on Activity: Applying Security Concepts
- Interactive scenario-based exercise to put theory into practice
- Group discussion and collaborative problem-solving
Charting Your Course: Actionable Steps
- Developing a personalized career roadmap
- Identifying resources for further learning and networking
- Q&A and open discussion
Course Wrap-up and Feedback
- Key takeaways and concluding remarks
- Feedback form and evaluation
Requirements
No specific technical skills or knowledge required, but reasonable understanding of common technologies e.g. Internet and standard IT tools such as MS Office.
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.