Course Info

Date: Mar-31-2025

Length: 1 Week

City: Dubai

Fees: 3,985

Type: In Classroom

Available Dates

  • Dec-23-2024

    Dubai

  • Jan-13-2025

    Dubai

  • Mar-31-2025

    Dubai

  • May-26-2025

    Dubai

  • July-14-2025

    Dubai

  • Sep-08-2025

    Dubai

  • Nov-03-2025

    Dubai

Dates in Other Venues

  • Dec-23-2024

    Paris

  • Dec-30-2024

    Singapore

  • Dec-30-2024

    Barcelona

  • Jan-13-2025

    London

  • Feb-24-2025

    Kuala Lumpur

  • Feb-24-2025

    Istanbul

  • Feb-24-2025

    Paris

  • Feb-24-2025

    Barcelona

  • Feb-24-2025

    Amsterdam

  • Feb-24-2025

    Singapore

  • Mar-31-2025

    London

  • May-26-2025

    Barcelona

  • May-26-2025

    London

  • May-26-2025

    Singapore

  • May-26-2025

    Amsterdam

  • May-26-2025

    Paris

  • May-26-2025

    Istanbul

  • May-26-2025

    Kuala Lumpur

  • July-14-2025

    London

  • Aug-25-2025

    Paris

  • Aug-25-2025

    Amsterdam

  • Aug-25-2025

    Barcelona

  • Aug-25-2025

    Istanbul

  • Aug-25-2025

    Kuala Lumpur

  • Aug-25-2025

    Singapore

  • Sep-08-2025

    London

  • Nov-03-2025

    London

  • Nov-24-2025

    Barcelona

  • Nov-24-2025

    Singapore

  • Nov-24-2025

    Istanbul

  • Nov-24-2025

    Paris

  • Nov-24-2025

    Kuala Lumpur

  • Nov-24-2025

    Amsterdam

Course Details

Course Outline

5 days course

  • ·     Introduction to Information Security
  • Essential Terms: Information Security, assets & vulnerability
  • The importance of information Security for businesses
  • The cyber security threats and Risks
  • CIA Triad
  • Case Studies of Recent Hacks
  • Phases of Hacking
  • Practicing cyber hygiene
  • Awareness of different types of security threats
  • Passive Reconnaissance – AV Media / Social Media / Print
  • Active Reconnaissance
  • The importance of social Engineering 
  • Social Engineering Techniques
  • Safely handle online monetary transactions
  • Essential Terms: Phishing, Whaling, Dumpster Diving, and Shoulder Surfing
  • Identifying phishing emails
  • The importance of Tailgating / Piggy-backing
  • Credential harvesting / Password guessing
  • Malware, Ransomware &  Key-loggers
  • Best IT Security Practices
  • Mobile device security threats & Prevention
  • Portable device/media security threats & Prevention
  • Preventive measures techniques

 

  • ·     Password Guidelines
  • Internet & Email usage
  • Identifying phishing emails
  • 2-Factor / Multi-factor authentication
  • 2-Factor / Multi-factor authentication
  • Case Studies of phishing emails

 

  •      Handling / Disposal of sensitive data (print/digital)
  • Data classification & labeling
  • Storage – encryption/hashing
  • Disposal
  • Physical Security
  • Access controls
  • Visitor management
  • Control measures
  • Regular updates and awareness of new hacking techniques

Course Video