First in the Middle East! This unique course which brings together not only an understanding of cyber threats and hacking, but also also investigatory and defensive capabilities, with practical elements it's about finding data and exploiting it to break into companies - what attackers can do and what defenders should do.

 

An exciting and informative course, delivered by a world renowned expert. This course presents a counter-point to the more formal and rigid ISO approach to cyber security. The course is not about firewalls and industry standards - it is about how attackers effectively target and hack organisations without being stopped by expensive technical defences, and without financial backing. The key to almost every effective cyber-attack is exploiting the human workforce. As such, the course concentrates on information security and the power of visible data, rather than the traditional focus on IT security.

 

The course simultaneously provides candidates with the investigative capabilities to probe the data vulnerabilities in their own staff, corporations and networks - though no technical knowledge is assumed. It is delivered by a former UK intelligence officer who specialises in tracking targets and organisations with open source tools.

Course Overview

 

 
  • Scene setters - case studies in small and large attacks.

  • Websites common attacks & hacking and counter measures

  • Attacking the human firewall - why human phishing beats any defensive tech.

  • Phishing - anatomy of an attack. Recent examples to analyse.

  • Search engines - advanced use in obtaining sensitive corporate data. With practical. (lab)

  • Social media - advanced use in obtaining hidden personal data. With practical. (lab)

  • Metadata extraction. Getting hold of corporate documents and deriving exploitable info. (lab)

  • Covert activity - concealing your online digital footprint from adversaries. With practical (lab)

  • Wi-fi exploitation. Understanding the tracking threat. With practical (lab)

  • Penetration testing - anatomy of a security audit. In-house and outsourcing.

  • Discussions (throughout) - approaches in defending an organisation.

Key Highlights
 
  • CISO

  • Security Director

  • Cyber Security Manager / Officer

  • Security Analyst / Engineer

  • SOC Analyst

  • Cyber Threat Analyst

  • CERT Member

  • System /IT Administrator

  • Security Administrator

  • Security Architect / Engineer

  • Compliance Officer / Auditor

  • Developer

  • Auditor

  • Compliance Officer

Designed For
 
Course Leader
 
Eyal Lemberger
 
Cyber Intelligence Practitioner,  OSINT Specialist & Forensic Expert

With over 15 years’ experience across a range of disciplines Eyal has a wealth of knowledge to share. Keeping up to date with ever changing technologies and threats is his passion.

 

Eyal started out managing the network of one of the UK’s largest computer hardware companies. He has continued to be involved with this Company, in various ways, throughout his career.

 

He has held positions within the UK’s Counter Terrorism (CT) branch and Police Force as one of their technical forensic investigators. He was involved in various major operations over his years with them. He had the opportunity to investigate all sorts of devices that came across his path, from mobile devices and satnavs through to large scale corporate networks.

 

Since leaving law enforcement he has worked as a Logical and Physical Security Auditor for Visa Europe. This involved reviewing the technical set up for the world’s largest Visa card manufacturers.

 

During this time he also started as a guest Lecturer with the Defense Academy at Cranfield University, teaching on the Forensic Computing Master’s Degree.

 

He now runs his own consultancy firm which leads him to work with a wealth of different companies and people. He specialized in network security deployments, investigations, and educating people of how to be more security conscious.

Fees
 
 
Venue
 

Sheraton Dubai Creek Hotel & Tower

Baniyas Street, Dubai Creek, Dubai
United Arab Emirates

Tel: + 971 42281111

Email: reservationsdubaiuae@sheraton.com
www.sheratondubaicreek.com

Register & pay before 12/09/16

and save USD 800

Send 3 Delegates to bring

4th Delegate Free

Are you interested in holding this course In-House?
 

Do you have a specific needs, requirements and business challenges?

We can bring our training courses to you!


If you have a team of 10 or more, why not hold a private, in-house course? Our experts will come to you and the course will be tailored to your requirements

 

The benefits of In-House Training:

  • Tailored to meet your business objectives and specific learning needs

  • Cost-effective - reduced training fee, minimal staff travel and associated expenses, reduced non-productive time away from the workplace.

  • Expert trainers hand-picked around the world for their market knowledge

  • Team oriented - entire teams or departments can be trained at one time

  • Flexible & hassle-free - we can take care of all logistics and administration

  • Convenient – Programs are delivered at a time, location and pace that fits in to your business schedule

  • Private and confidential

If you would like more information about how in-house training can benefit your organization, please send us an email and we will be in touch with you shortly to discuss your training needs.

Tel: (65) 6717 6016 | Email: enquiry@spire-events.com

Terms & Conditions | Privacy | Sitemap

© Spire Events Pte Ltd 2019 all rights reserved

  • Facebook Classic
  • LinkedIn Classic
  • Twitter Classic
  • YouTube Social  Icon