Cloud Security Workshop

Cloud Security Workshop

Over de Cloudsecurity Workshop

Cloud computing is vandaag de dag een zeer hot topic. De meeste bedrijven maken al gebruik van de cloud of zijn van plan om een onderdeel of hun volledige activiteiten naar de cloud te verplaatsen. Hiermee komen er serieuze verantwoordelijkheden op het gebied van security en naleving van regels en voorschriften met betrekking tot de gegevensprivacy en ook andere zorgen over security, zoals de bescherming van de bedrijfseigen informatie.

Wat moet u weten voordat u het plan maakt om naar de cloud te migreren. Als u al bezig bent met migratie, wat zijn dan de valkuilen waar u op moet letten en hoe gaat u om met security en compliance in uw cloudomgeving?

Deze workshop biedt u wat u moet weten om een succesvol Cloudsecuritysbeleid te hebben voor uw organisatie.

In deze workshop neemt onze Cloud Security Expert u mee door de bouwstenen van Cloud Security. Waar begin je en wat u moet doen om een organisatie veilig naar de cloud te migreren. Op basis van de casestudy uit het echte leven leert u het volgende:

  • Inleiding krijgen tot cloudsecurity op basis van een casestudy over cloudsecurity in de praktijk.
  • Leren begrijpen diverse areas van de cloudsecurity zoals:
  • Cloud Infrastructure security
  • Virtualisation (VM, Containers) security
  • Cloud application Security
  • Cloud Identity and Access management
  • Create cloud application visibility and security orchestration.
  • The Cloud Security Reference Architecture
  • Securing cloud application
  • Meer informatie krijgen over het verbeteren van cloudsecurity met behulp van de Cloud Access Security Broker (CASB)
  • Leren hoe u een Cloud-securitysprogramma bouwt met behulp van de CSA Cloud.

 

Voor wie is deze workshop bedoeld

Deze workshop is voor IT Professionals, Experts & Consultants die geïnteresseerd zijn meer te weten willen komen over Cloud Security en graag praktische informatie willen vinden over het spannende gebied van Cloud Security.

Laat het ons weten als je wilt spreken op een van onze Cybersecurity Friday Event!

We zijn altijd op zoek naar goede sprekers die inzicht willen en kunnen geven over cybersecuritysonderwerpen die de maatschappij ten goede kunnen komen. Als u zo’n persoon bent, neem dan contact met ons op voor een gesprek.

Sponsor een cybersecurity Friday Event.

4 + 4 =

Understanding Network Security and Defence

Understanding Network Security and Defence

Network Security and Defence

This course is intended to help participants understand defensive security. It is built on the concept of “The best defence is a good offense”. Network security professionals need to look beyond the configuration of the hardware and software alone but start looking and the traffic flow within the network. The knowledge of what traffic flow to where in the network will help define defensive security.

In course is built around four security areas:

  • Network device security
  • Endpoint security
  • Application security
  • Parameter less security

In this course the participant will learn the following:

  • Computer Network and Defense Fundamentals.
  • The Biggest Misconception in Cyber defense
  • Starting network defence through vulnerability testing, Pentesting and audit.
  • How to use threat hunting & OSINT activities to understand the threats faced by the organization.
  • Learn how to use the MITRE ATT&CK framework to learn about network threats and the various technical and tactics used by threat actors.
  • Identify detection capabilities, or lack thereof.
  • Learn to track defensive security controls,
  • Traditional v. Modern Cyber Defense methods
  • Network Security Threats, Vulnerabilities, and Attacks.
  • The Role of ethical hacking in network defence
  • Wireless Network Defence.
  • Network Monitoring and Analysis.
  • Network Security Controls, Protocols, and Devices
  • How to Improve Cyber Defense for your Network
  • Building a defensible network architecture
  • Designing a security Choke Points and Network Inspection
  • Endpoint defence
  • Network Security Monitoring
  • Network Security Controls, Protocols, and Devices.
  • Systems Hardening and Security Baselining
  • Learn about available open-source projects, like Red Canarys Atomic Red Team, to help test security controls that align with specific ATT&CK techniques.
  • The security Operating Center (SOC)
  • Elements of Security Operating Center (SOC)
  • Understand security orchestration, automation, and response (SOAR) solutions to automate the testing of your security controls and get a clear view of what you can detect versus what you cannot.
  • Learn how SOAR can help organizations automate the testing of security controls.

      The is designed with a strong focus on the practical implementation of the lessons. So, there is lots of focus on defensive tooling. Each module is accompanied by practical security lab.

       

       

      Who Should Attend

      This course will benefit IT Security Professionals, Network and Security architects, Blue, Red & Purple Team members. Those in DevOps and DevSecOps. Penetration testers. Ethical hackers, Windows, and Linux Experts & Administrators

      The Zero Trust Security (ZTS) Workshop

      The Zero Trust Security (ZTS) Workshop

      About The Zero Trust Security (ZTS) workshop

      The Zero Trust Security workshop is design to provide a strong introduction of Zero Trust Security to the participants. It is about the new way of a holistic focus on security. The participants will learn about the fundamentals of Zero Trust Security and why it is better than perimeter security in defending the organisation against the effect of phishing, ransomware, and other modern form of cyber-attack. During the workshop you will learn the following:

      • Introduction based on a real-life case study to Zero Trust Security (ZTS)
      • Zero Trust vs traditional perimeter security?
      • Why do we need Zero Trust Security?
      • Components of Zero Trust Security
      • Understand the true meaning of the Zero Trust security framework.
      • Determine how to apply security best practices represented in the latest Zero Trust framework to your organization.
      • Understand how to assess your existing security capabilities and map out a plan for improving your organization’s security practice.
      • Understand security best practices for all areas of your business (cloud, endpoint, and network)
      • A look at a vendor perspective of Zero Trust Security Model
      • Get a quick look at Zero Trust Security in the Cloud using

      At the end of this workshop participants will understand what Zero Security is and get more resources to learn and research about it further.

      Who Should Attend

      The workshop is designed for system, network and cloud professionals who would like to know more about Zero Trust Security. This includes but not limited to Network Architects, Network professionals, Cloud Engineers, Software Developers and Systems administrators, and Cybersecurity/ Information Security professionals.

      The Zero Trust Security (ZTS) Workshop

      Understanding Zero Trust Security (ZTS)

      SEC 103 Understanding Zero Trust Security (ZTS)

      About the Zero Trust Security (ZTS) Course

      This 2-day intense course focuses on this new way of thinking about network security. Learn about the fundamentals of Zero Trust Security and how to start with its implementation in your company. During the training you will learn the following:

      • Introduction to Zero Trust Security
      • Zero Trust vs traditional perimeter security?
      • Why do we need Zero Trust Security?
      • Why is the Zero Trust Model Important?
      • Understanding micro Segmentation
      • Implementing a perimeterless Design
      • Identity management for Zero Trust Security
      • The Pillars of Zero Trust Security
      • Device Trust
      • User Trust
      • The five steps to a Zero Trust network
      • How to architect a Zero Trust network
      • A look at some vendor implementation of Zero Trust Security Model
      • Zero Trust Security in the Cloud using  Cloud Access Security Broker (CASB)

      At the end of this course all participants will understand what Zero Security is and able to determine if it will be useful for their company and how to get started with it.

      Target Audience

      This training course is intended for professionals who would like to keep up to date with the new technology and apply them in real life environment.

      • CISO’s
      • Security Risk Managers
      • Security Engineers
      • Information Security Managers.
      • Information Security Directors.
      • All other security professionals who want to be kept up to date.

       

      Intellfence Logo

      WE TEACH YOU INFORMATION SECURITY SKILLS  TO USE YOUR ABILITIES THROUGH OUR MASTERING PROGRAM

      © 2021 Intellfence BV. –  All Rights Reserved

      Intellfence BV
      Erfstede 4b 
      3431 KH
      Nieuwegein

      info@intellfence.com

      Understanding Data Loss Prevention (DLP)

      Understanding Data Loss Prevention (DLP)

      SEC105 Understanding Data Loss Prevention (DLP)

      About the Data Loss Prevention (DLP) Course

      Data Loss is one of the biggest security challenges faced by companies today. This pose significant risks to the organization in terms of compliance to regulations, financial and reputational risk that can result from a breach of confidential data. Organization needs to find ways to protect their data and keep the customer’s data secure through. Data Loss Prevention (DLP) systems is one of the method used for this. It helps organizations to identify, monitor, and protect data in use and in transit.

      The workshop will focus on the following topics:

      • Overview of data prevention.
      • The need for data loss prevention.
      • The risk of Data Loss to the organization.
      • A look at leading data loss prevention systems.
      • Understand and learn to implement Data Loss Prevention Solutions to meet the data protection needs.
      • Implement DLP systems with Security Information and Events Management (SIEM) systems.

      The Online Classroom includes:

      • Access to recordings and course content for 360 days.
      • Interactive flash cards to reinforce learning
      • Independent reading and learning activities
      • Case studies and real-world scenarios
      • Knowledge checks after each domain
      • Post-course assessment questions to gauge exam readiness

      Target Audience

      This training course is intended for professionals who would like to keep up to date with the new technology and apply them in real life environment.

      • CISO’s
      • Security Risk Managers
      • Security Engineers
      • Information Security Managers.
      • Information Security Directors.
      • All other security professionals who want to be kept up to date.

       

      Understanding Data Loss Prevention (DLP)

      Understanding Data Loss Prevention (DLP)

      About
      Understanding Data Loss Prevention (DLP)

      Data Loss is one of the biggest security challenges faced by companies today. This pose significant risks to the organization in terms of compliance to regulations, financial and reputational risk that can result from a breach of confidential data.   Organization needs to find ways to protect their data and keep customer’s data secure through.  Data Loss Prevention (DLP) systems is one of the method used for this. It helps organizations to identify, monitor, and protect data in use and in transit.

      The workshop will focus on the following topics:

      Overview of data prevention.

      The need for data loss prevention.
      The risk of Data Loss to the organization.
      A look at leading data loss prevention systems.
      Understand and learn to implement Data Loss Prevention Solutions to meet the data protection needs.
      Implement DLP systems with Security Information and Events Management (SIEM) systems.
      How to combine it with User Entity Behavioural Analyses (UEBA).
      Understand the Security Orchestration and Automation (SOAR) solutions.

      Who Should Attend
      CISO’s
      Security Risk Managers
      Security Engineers
      Information Security Managers.
      Information Security Directors.
      All other security professionals who want to be kept up to date.

      Let us know if you want to speak at one of our Cybersecurity Friday Event!

      We are constantly looking for good speakers that can provide insights in cybersecurity topics that would benefit the community. If you are such a person please contact us for a conversation.

      Sponsor A Cybersecurity Event.

      8 + 2 =