Course Info

Length: 1 Week

City: Dubai

Type: In Classroom

Available Dates

  • Feb-03-2025

    Dubai

  • Apr-07-2025

    Dubai

  • June-16-2025

    Dubai

  • Aug-04-2025

    Dubai

  • Oct-06-2025

    Dubai

  • Dec-15-2025

    Dubai

Dates in Other Venues

  • Jan-06-2025

    London

  • Jan-06-2025

    Istanbul

  • Jan-06-2025

    Paris

  • Jan-06-2025

    Kuala Lumpur

  • Jan-06-2025

    Singapore

  • Jan-06-2025

    Barcelona

  • Jan-06-2025

    Amsterdam

  • Mar-17-2025

    London

  • Apr-07-2025

    Amsterdam

  • Apr-07-2025

    Kuala Lumpur

  • Apr-07-2025

    Paris

  • Apr-07-2025

    Istanbul

  • Apr-07-2025

    Singapore

  • Apr-07-2025

    Barcelona

  • May-05-2025

    London

  • July-07-2025

    Barcelona

  • July-07-2025

    Istanbul

  • July-07-2025

    Amsterdam

  • July-07-2025

    Paris

  • July-07-2025

    London

  • July-07-2025

    Kuala Lumpur

  • July-07-2025

    Singapore

  • Sep-15-2025

    London

  • Oct-06-2025

    Kuala Lumpur

  • Oct-06-2025

    Barcelona

  • Oct-06-2025

    Amsterdam

  • Oct-06-2025

    Paris

  • Oct-06-2025

    Singapore

  • Oct-06-2025

    Istanbul

  • Nov-03-2025

    London

Course Details

Course Outline

5 days course

  • ·     Introduction to Information Security
  • Essential Terms: Information Security, assets & vulnerability
  • The importance of information Security for businesses
  • The cyber security threats and Risks
  • CIA Triad
  • Case Studies of Recent Hacks
  • Phases of Hacking
  • Practicing cyber hygiene
  • Awareness of different types of security threats
  • Passive Reconnaissance – AV Media / Social Media / Print
  • Active Reconnaissance
  • The importance of social Engineering 
  • Social Engineering Techniques
  • Safely handle online monetary transactions
  • Essential Terms: Phishing, Whaling, Dumpster Diving, and Shoulder Surfing
  • Identifying phishing emails
  • The importance of Tailgating / Piggy-backing
  • Credential harvesting / Password guessing
  • Malware, Ransomware &  Key-loggers
  • Best IT Security Practices
  • Mobile device security threats & Prevention
  • Portable device/media security threats & Prevention
  • Preventive measures techniques

 

  • ·     Password Guidelines
  • Internet & Email usage
  • Identifying phishing emails
  • 2-Factor / Multi-factor authentication
  • 2-Factor / Multi-factor authentication
  • Case Studies of phishing emails

 

  •      Handling / Disposal of sensitive data (print/digital)
  • Data classification & labeling
  • Storage – encryption/hashing
  • Disposal
  • Physical Security
  • Access controls
  • Visitor management
  • Control measures
  • Regular updates and awareness of new hacking techniques

Course Video