Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
5G TECHNOLOGIES
a) Access Network
All Course Calendar
Archives
b) Core Network
BASIC TRAININGS FOR PROFESSIONALS
BUSINESS & PROJECT MANAGEMENT
Carrier Ethernet Program
CERTIFICATION PROGRAMMES
CYBERSECURITY TRAININGS
DATA ANALYTICS
Demo
FIBER OPTICS COMMUNICATIONS
Forms
INTERNET OF THINGS (IoT)
IP, ETHERNET, MPLS / TRAFFIC ENGINEERING
IPTV, OTT MEDIA TECHNOLOGIES
LTE / 4G TECHNOLOGIES
Member
NETWORK OPERATIONS & SUPPORT
NETWORK QoS & OPTIMIZATION
Old content from Joomla
SDN NFV / DATA CENTRE TECHNOLOGIES
SIP / IMS / ROAMING
Telefocal Certification Programmes
Testimonials
Training Course Calendar
Training Courses
TRANSMISSION TECHNOLOGIES

An Overview of Cyber Security

Share this page on:

Course Objectives:

Upon completion, participants will be able to:

  • Describe the principal types of security threat which individual computer users, governments, SMEs and large corporations are exposed to;
  • Describe the strengths and weaknesses of defence mechanisms deployed by end users, network administrators, and network operators to overcome security threats
"This course allows me to fully appreciate the risks that Cyber Security presents. "
~ Wee K, SINGTEL
  • Understand the separate motivations of hackers, crackers and risk managers, and the role each plays in the current cybersecurity landscape;
  • Appreciate the evolution of the technology involved in cybersecurity, including concepts such as encryption,firewalls, layering, redundancy, identity and authentication
  • Appreciate the increasing importance of cybersecurity in Internet based products, particularly arising from the growth in cloud computing
  • Develop a war gaming approach to test the security of networks

Course Overview:

This course is designed to give experienced telecoms and computer network professionals additional specialised cybersecurity skills, allowing them to focus on how end-to-end network protection is optimised. For executives without a background in networking, and are tasked with protecting their company against cyber-attacks, the course provides an appreciation of network vulnerabilities used by hackers, and the techniques used to thwart them. Internet users will gain valuable insights on how to keep themselves protected and to prevent exposure to vulnerable network.

Key Benefits:

The ever present threat of cyber attacks, which can paralyse a laptop, a corporation or a government, requires a portfolio of weapons to be maintained in the cyber armoury to protect and deter. A virus protection programme, a firewall, or network redundancy scheme used in isolation will rarely provide adequate projection. This course not only gives an overview of the latest protection mechanisms, but also describes also how a multi-faceted protection solution should be adopted, to keep up with the evolving threat.

Who Should Attend?

Network Security Executives, Network Security Auditors, Business Continuity Professionals, Telecom and Computer Network Engineers, Strategic Network Planners, Security Product Development. Telecom Regulators.

Course Duration:

2-day, Instructor-led Live Virtual Training

Course Outlines:

Day 1:

The Cyber Security Landscape

  • Introduction
  • What is cyber security?
  • Terminology
  • Current Trends
  • Cyber Congress (Doha 2015)
  • Cyber Crime as a Business
  • Cost of Cyber Attacks: Financial & non - Financial
  • Countries best prepared against Cyber Attacks

Types of Attack and Motivation

  • Cyber Crime
  • ‘Hacktivism’
  • Cyber Espionage
  • Cyber War
  • Top Targets
  • Hacking vs Cracking
  • Attack Surface and Weak Points of Entry
  • Malware and Viruses
  • Denial of Service attacks
  • Attack Vectors
  • Crime – ware tools
  • Cyber Attacks – An evolving threat
  • Case Studies

Key Areas Requiring Security

  • Cloud Services Security
  • Internet of Things Security
  • Devices Security
  • Mobile Technology Security
  • Submarine Cables Security
  • Satellite System Security
  • Broadcasting Security

Day 2:

Strengths and Weaknesses of Defence Mechanisms

  • Cyber Security Risk Management
  • Cryptography and Encryption
  • Firewalls
  • Layering
  • Redundancy
  • Passwords
  • Identity
  • Authentication Legal intercept
  • Deep packet inspection
  • Intrusion Detection
  • Case Studies

Cyber Security Solutions

  • Security solution and cost benefit analysis
  • Incident response
  • Confidentiality, Integrity, Availability
  • War gaming
  • A Multi-faceted approach

 


Threats are a fact of life in the world of cyber security. One of the most challenging aspects of cyber security is constantly evolving nature of security risks.From internal threats to creative ransomware to the Industrial Internet of Things (IoT), security experts surmised that commercial cyber security threats would likely materialize in the next years.

Some of the Cyber Attacks that need to be avoided are : Malware (including Trojans, viruses and worms), Phishing Attacks, Password Attacks, Denial-of-Service (DoS) Attacks, Rogue Software, etc.

We cannot eliminate the threats but we can be protected from them. This should be done without disrupting business innovation and growth.

How can we defend ourselves against these threats and risks?

The only sure defense is Knowledge. And Top Management of any organisation needs to have this Knowledge.

Related Course Topics

5G Security Overview Duration and Training Format 2 days, Instructor-led Training   Introduction Full deployment of 5G will happen very soon, probably in 2020. Expectations are high, as are security concerns. Significantly more devices and increased use of ...
ABCs of Telecommunications The Telecommunications landscape is in a constant flux of change. For telecommunication professionals, knowledge and competence is vital in this ever-changing industry. This course provides Telecommunication Professionals with an overview of how va...
Basics of IP and Transmission Technologies Duration and Training Format 21 instruction hours 3-day instructor-led classroom based training 4-day Virtual Training Course Objectives After attending the training, participants will be able to: Gain a good knowledge IP basics and TCP/IP protoco...
Blockchain and Crypto Currencies Explained Course Overview: The introduction to Blockchain course is designed to be an entry level course suitable for complete crypto newbies. The course will help you to understand the various elements of the crypto-verse, how to understand the technical j...
Cyber Fundamentals Training with Hands-On Labs Course Overview: The main objectives of this course is to address some fundamentals of Cyber Security topics, and provide insights into the modern security environment. It seeks to explain the cyber threat landscape and attackers' mentality, inclu...

Contact Us

  • This field is for validation purposes and should be left unchanged.
Telefocal Asia © All rights reserved.

Setup Menus in Admin Panel

Skip to toolbar