COURSE OVERVIEW
IE0709 : Certified Cyber Security Practitioner (ISACA Exam Preparation Training)
OVERVIEW
COURSE TITLE | : | IE0709 : Certified Cyber Security Practitioner (ISACA Exam Preparation Training) |
COURSE DATE | : | Dec 16 - Dec 18 2024 |
DURATION | : | 3 Days |
INSTRUCTOR | : | Dr. Mohamed Zayan |
VENUE | : | Dubai, UAE |
COURSE FEE | : | $ 3750 |
Request For Course Outline |
OTHER SCHEDULED DATES
Date | : | Jun 24 - Jun 26 2024 (3 Days) | Location | : | Istanbul, Turkey | Classroom Fee (US$) | : | $ 4250 | Course Info |
Date | : | Sep 16 - Sep 18 2024 (3 Days) | Location | : | Al Khobar, KSA | Classroom Fee (US$) | : | $ 3750 | Course Info |
Date | : | Feb 03 - Feb 05 2025 (3 Days) | Location | : | Al Khobar, KSA | Classroom Fee (US$) | : | $ 3750 | Course Info |
Date | : | Jun 22 - Jun 24 2025 (3 Days) | Location | : | Istanbul, Turkey | Classroom Fee (US$) | : | $ 4250 | Course Info |
Date | : | Sep 15 - Sep 17 2025 (3 Days) | Location | : | Abu Dhabi, UAE | Classroom Fee (US$) | : | $ 3750 | Course Info |
Date | : | Dec 14 - Dec 16 2025 (3 Days) | Location | : | Dubai, UAE | Classroom Fee (US$) | : | $ 3750 | Course Info |
Course Description
This practical and highly-interactive course includes reallife case studies where participants will be engaged in a series of interactive small groups and class workshops. This course is designed to provide participants with a detailed and up-to-date overview of cyber security. It covers the business and security environment including digital infrastructure, enterprise architecture, data and digital communication; the security environment that include network, operating systems, applications, virtualization and cloud; the operational security readiness, protection and preparedness as well as digital and data assets, ports and protocols, protection technologies, access management and configuration management; and the threat modeling, contingency planning and security procedures. During this interactive course, participants will learn the threat detection and evaluation by monitoring vulnerability management, security logs and alerts, monitoring tools and appliances, uses cases and penetration testing; analyzing the network traffic, packet capture, data, research and correlation; the incident response and recovery, restoring incident handling, notifications, escalation and digital forensics; and mitigating containment, attack countermeasures and corrective actions as well as restoring security functions validation, incident analysis, reporting and process improvement.
link to course overview PDFTRAINING METHODOLOGY
This interactive training course includes the following training methodologies:
LecturesWorkshops & Work Presentations
Case Studies & Practical Exercises
Videos, Software & Simulators
In an unlikely event, the course instructor may modify the above training methodology for technical reasons.
VIRTUAL TRAINING (IF APPLICABLE)
If this course is delivered online as a Virtual Training, the following limitations will be applicable:
Certificates | : | Only soft copy certificates will be issued |
Training Materials | : | Only soft copy materials will be issued |
Training Methodology | : | 80% theory, 20% practical |
Training Program | : | 4 hours per day, from 09:30 to 13:30 |