top of page
Countdown to Event

First in Asia! This unique course brings together an understanding of general cyber threats but also investigatory and defensive capabilities, with practical elements it's about finding data and exploiting it to break into companies - what attackers can do and what defenders should do.


An exciting and informative course, delivered by a world renowned expert. This course presents a counter-point to the more formal and rigid ISO approach to cyber security. The course is not about firewalls and industry standards - it is about how attackers effectively target and hack organisations without being stopped by expensive technical defences, and without financial backing. The key to almost every effective cyber-attack is exploiting the human workforce. As such, the course concentrates on information security and the power of visible data, rather than the traditional focus on IT security.


The course simultaneously provides candidates with the investigative capabilities to probe the data vulnerabilities in their own staff, corporations and networks - though no technical knowledge is assumed. It is delivered by a former UK intelligence officer who specialises in tracking targets and organisations with open source tools.

Course Overview


Anchor 1
  • Scene setters - case studies in small and large attacks.

  • Attacking the human firewall - why human phishing beats any defensive tech.

  • Phishing - anatomy of an attack. Recent examples to analyse.

  • Search engines - advanced use in obtaining sensitive corporate data. With practical. (lab)

  • Social media - advanced use in obtaining hidden personal data. With practical. (lab)

  • Metadata extraction. Getting hold of corporate documents and deriving exploitable info. (lab)

  • Covert activity - concealing your online digital footprint from adversaries. With practical (lab)

  • Wi-fi exploitation. Understanding the tracking threat. With practical (lab)

  • Penetration testing - anatomy of a security audit. In-house and outsourcing.

  • Discussions (throughout) - approaches in defending an organisation.

Key Highlights
Anchor 2
  • CISO

  • Security Director

  • Cyber Security Manager / Officer

  • Security Analyst / Engineer

  • SOC Analyst

  • Cyber Threat Analyst

  • CERT Member

  • System /IT Administrator

  • Security Administrator

  • Security Architect / Engineer

  • Compliance Officer / Auditor

  • Developer

  • Auditor

  • Compliance Officer

Designed For
Anchor 3
Course Leader
Anchor 4
Eyal Lemberger
Cyber Intelligence Practitioner,  OSINT Specialist & Forensic Expert

With over 15 years’ experience across a range of disciplines Eyal has a wealth of knowledge to share. Keeping up to date with ever changing technologies and threats is his passion.


Eyal started out managing the network of one of the UK’s largest computer hardware companies. He has continued to be involved with this Company, in various ways, throughout his career.


He has held positions within the UK’s Counter Terrorism (CT) branch and Police Force as one of their technical forensic investigators. He was involved in various major operations over his years with them. He had the opportunity to investigate all sorts of devices that came across his path, from mobile devices and satnavs through to large scale corporate networks.


Since leaving law enforcement he has worked as a Logical and Physical Security Auditor for Visa Europe. This involved reviewing the technical set up for the world’s largest Visa card manufacturers.


During this time he also started as a guest Lecturer with the Defense Academy at Cranfield University, teaching on the Forensic Computing Master’s Degree.


He now runs his own consultancy firm which leads him to work with a wealth of different companies and people. He specialized in network security deployments, investigations, and educating people of how to be more security conscious.

Anchor 5
Book & Pay Before 07/07/2016
Book & Pay After 07/07/2016
Anchor 6

Radisson Hotel Brunei Darussalam

Jalan Tasek 2203, Bandar Seri Begawan BS8211, Brunei

Tel: + 673 224 4272

Fax: +673 222 1579


Register & pay before 07/07/16

and save SGD 900

Send 3 Delegates to bring

4th Delegate Free

Are you interested in holding this course In-House?

Do you have a specific needs, requirements and business challenges?

We can bring our training courses to you!

If you have a team of 10 or more, why not hold a private, in-house course? Our experts will come to you and the course will be tailored to your requirements


The benefits of In-House Training:

  • Tailored to meet your business objectives and specific learning needs

  • Cost-effective - reduced training fee, minimal staff travel and associated expenses, reduced non-productive time away from the workplace.

  • Expert trainers hand-picked around the world for their market knowledge

  • Team oriented - entire teams or departments can be trained at one time

  • Flexible & hassle-free - we can take care of all logistics and administration

  • Convenient – Programs are delivered at a time, location and pace that fits in to your business schedule

  • Private and confidential

If you would like more information about how in-house training can benefit your organization, please send us an email and we will be in touch with you shortly to discuss your training needs.

bottom of page