הקורס נפתח גם במתכונת Live class - למידה און ליין בכיתות אינטראקטיביות עם מיטב המרצים והתכנים של ג'ון ברייס /המי"ל.
ניתן לפתוח קורס בהתאמה אישית לארגונים במועד שיתואם עימנו
When exactly did information security become cyber warfare? What changed? How do modern attacks against information systems differ from what hacking was 5-10 years ago? Old defense doctrines are ineffective against modern APT-like scenarios. Successful attacks are no longer measured by whether the perimeter was breached. The student learns to understand that the breach is inevitable and true defenses are organic, highly-iterative, mixed approached and heavily dependent on human resource. Effective security operations have to correspond to the modern kill-chain, so before security can be implemented, specific attack scenarios should be carefully examined. The student will understand the concepts of reactive vs. proactive security.
What is cyber and the digital universe?
What is denial of service and how it is performed?
How is information gathering performed?
How to gain privileges (with brute-forcing and without)?
How to inject code into interpreted context?
How to exploit vulnerable code?
What are blacklists and how are they implemented?
What are whitelists and how are they implemented?
How to improve authentication mechanisms?
How to better manage your current assets?
How to create baselines and detect anomalies?
How to use and improve the human factor?
What are APTs?
What is the anatomy of a modern breach?
How do mitigation strategies compare?
How is security a process?
What is security by design?
Our public course targets entry level participants – no prior technical knowledge is required: sales, pre-sales, customer support, product, business development and management personnel.
This course can also be adapted for junior level technically-oriented audiences with prior technical experience: IT, NOC, SOC, Dev-ops, SW developers, SW QA, and others with technical skills. This option is available only for groups or organizations ordering this course as tailor made.
Part 1: Threat Landscape