IT, Telecommunication , Networking Training Courses

Cyber Security Specialist

Duration
2025-11-02 5 Days 2025-11-06
Attendance

Hotel Meeting Room

Hotel Meeting Room
Course code
IT-741
Copied !
City / venue
Marrakesh

Classroom

Fees / hours
2950 $ | 25 Hours

Course registration form

Candidate Data

Candidate full name *
Email *
Private phone number *

Work phone number

Optional

Country & City *
Company / Employer *

Invoice Recipient Data

Recipient name *
Recipient phone number *
work phone number *

Recipient email

Optional

Recipient work address details

Optional



Sending course brochure to my e-mail

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Email *

Private phone number

Optional



Call me back

Please leave us your contacts, and we will call you back as soon as possible

Full name *
Private phone number *
Company / Employer *


Course Inquiry

Please provide us with your contacts with your inquiry, and we will answer it as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



In-house proposal

Please provide us with your contacts and the details of the needed in-house proposal, and we will contact you as soon as possible

Full name *
Email *
Private phone number *
work phone number *
Country & City *
Company / Employer *

Your Inquiry



Course details

Overview ?

Why Attend

This course will provide participants with in-depth knowledge and practical skills to plan, deliver and monitor IT/cyber security to internal and external clients encompassing a complete, conjoined set of disciplines in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking.

It will also cover WiFi security, Website security, human factors, cyber forensics, cyber security team management, Secure Operations Center (SOC) and Computer Security Incident Response Team (CSIRT) infrastructures.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.  All participants will be given copies of Run Books to deal with cyber extortions, Distributed Denial of Service (DDoS/DoS) and forensic investigations.

Course Methodology

The course will include practical sessions, videos as well as live examples [e.g. Virus] and demonstrations of white and black hat hacking tools. All participants will also be provided with the latest research papers and articles.

As part of the course, participants will conduct a risk assessment of two different deployments based on the ISO27001 to identify any direct, or indirect threats, security exposures, or potentials for vulnerabilities. Participants will also respond to an example security incident and identify the best practices which could be applied to secure their own organization, and associated assets.

Course Objectives

By the end of the course, participants will be able to:

  • Apply information security standards to their organization and its critical assets
  • Identify the threats presented by viruses, malware, active code, and Active Persistent Threats (APT) and consider the different mitigating options
  • Formulate and manage effective cyber security teams, and apply the Computer Security Incident Response Team (CSIRT) framework, tools and capabilities to deliver cost effective and robust solutions to protect the organization
  • Use Neuro Linguistic Programing (NLP) to deliver messages that will change the way employees work and think about security
  • Examine the area of wireless security protocols, their security attributes, and their potential insecurities within the organization, and in public spaces
  • Illustrate how penetration testing and ethical hacking enhance organizational security
  • Evaluate and apply two of the most important aspects in the modern day of cyber-adversity: Open Source Intelligence (OSINT) and cyber threat intelligence

 

Course Outline
  • Adapting to evolving standards
    • Information security standards (e.g. PCI-DSS/ISO27001)
    • Documented tools:
      • ISO/IEC 27001
      • PAS 555
      • Control Objectives for Information and Related Technology (COBIT)
    • Future standards
      • ISO/IEC 2018
      • EU privacy regulations
      • Local and international government stipulations implicating access to private data
  • Principles of IT security
    • Enterprise security
      • External defenses
      • Web filtering
      • Intruder Prevention Systems (IPS)
      • Intruder Detection Systems (IDS)
      • Firewalls
    • Secure code
    • Software Development Lifecycles (SDL)
    • Potential insecurities within developed applications
    • WiFi security protocols and attributes
    • Voice over IP (VoIP) security
    • Governance Risk and Compliance (GRC)
    • Security Incident Event Management (SEIM) applications
    • Cloud security
    • Third party security and compliance
  • Adopting cyber security measures
    • Employee perception on security through Neuro Linguistic Programing (NLP)
    • Security education and awareness: techniques, systems, and methodologies
    • Penetration testing
    • Ethical hacking
    • Options to mitigate viruses, malware, active code threats and Active Persistent Threats (APT)
    • The Computer Incident Response Team (CSIRT) frameworks, tools and capabilities
    • Incident first response: proven methodologies, tools, and systems
    • The science of applying robust digital forensics: applicable law, capabilities, and methodologies
    • Supervisory Controls and Data Acquisition (SCADA); security requirements, processes and methodologies
    • Abuse images: complying with local and international law
    • Building cyber security teams
      • Creation and management of a Secure Operations Center (SOC)
      • Development of the Corporate Security Organization Framework
      • Formulation and deployment of a Computer Security Incident Response Team (CSIRT)
      • Bespoke Security Incident and Event System (SIEM) for the operational deployment
      • Risks associated with I/O Security (e.g. USBs, CDs, other forms of media)
      • Risks of Active Code Injection, and mitigation techniques
    • Advanced cyber risks and tools
      • Cyber crime and the darknet/darkweb: the world of the hackers/hacktivists
      • The underground of cyber criminality
      • Social engineering as a tool to test operational resilience
      • Open Source Intelligence (OSINT)
      • Cyber threat intelligence
      • Open source and commercial security tools
      • The operational use of encryption
      • Virtual private networks
    • Steganography - Techniques used to hide hacking tools and malware on networks
      • Command line and tools used to identify and extract dangerous files and contain malware and hacking applications
      • The 1-10-60 Rule to identify and contain dangerous hidden applications
      • Alternate Data Streams (ADS) and the threats they can pose under an NTFS environment
      • Leveraging ADS to hide undetectable malware within an operational network

Day 1

Asset Cost Management Introduction

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 2

Laying the Groundwork

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 3

Applying the Value based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 4

Ensuring the Continuity of the Value-based Process

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Day 5

Supporting Process that Lower Life-cycle costs

Definitions of reliability, maintenance & asset management
The total cost of maintenance
Best practice reliability and maintenance processes
Elements of asset management best practice
Auditing performance
Overview of TPM, RCM, BCM, QCM, and other asset management buzzword
Open discussion sessions

Training Methodology

Pathways Training and consulting adopts the newest techniques of human resources Training and consulting and, with the following:

  • Theoretical lectures are delivered via PowerPoint and visual displays (videos and short films)
  • Making scientific evaluation to the trainee (before and after)
  • Brainstorming and role-playing
  • Using case studies related to the scientific material being delivered and the trainees' work.
  • The participants get the scientific and practical material printed and on CDs and Flash memories.
  • Preparing records and reports of the participants' attendance and results, with a general evaluation of the training program.
  • A group of the best trainers and experts in all fields and specialties professionally prepares the scientific material.
  • After finishing the course, the participants get certificates of attendance signed, certified, and issued by pathways Training and consulting.
  • Our training programs start at 9:00 o'clock in the morning and end at 2:00 in the afternoon, with snack buffet during the lectures.
  • Providing a lunch buffet during the training program period, with organizing a lunch party on the training program final day for taking some photos and certificate awarding.
Different venues & timings for this course

Course name

Duration

City

Price

Cyber Security Specialist

17, Feb 2025 21, Feb 2025

Beijing

4950$

Cyber Security Specialist

24, Feb 2025 28, Feb 2025

Kuala Lumpur

3250$

Cyber Security Specialist

02, Mar 2025 06, Mar 2025

Manama

2750$

Cyber Security Specialist

09, Mar 2025 13, Mar 2025

Casablanca

2950$

Cyber Security Specialist

10, Mar 2025 14, Mar 2025

Trabzon

3500$

Cyber Security Specialist

16, Mar 2025 20, Mar 2025

Cairo

2450$

Cyber Security Specialist

17, Mar 2025 21, Mar 2025

Amsterdam

4750$

Cyber Security Specialist

23, Mar 2025 27, Mar 2025

Sharm ElShaikh

2750$

Cyber Security Specialist

23, Mar 2025 27, Mar 2025

Jeddah

2750$

Cyber Security Specialist

31, Mar 2025 04, Apr 2025

Bangkok

4950$

Cyber Security Specialist

14, Apr 2025 18, Apr 2025

Marbella

4750$

Cyber Security Specialist

27, Apr 2025 01, May 2025

DUBAI

2950$

Cyber Security Specialist

11, May 2025 15, May 2025

Riyadh

2750$

Cyber Security Specialist

25, May 2025 29, May 2025

Doha

3500$

Cyber Security Specialist

01, Jun 2025 05, Jun 2025

DUBAI

2950$

Cyber Security Specialist

01, Jun 2025 05, Jun 2025

Marrakesh

2950$

Cyber Security Specialist

09, Jun 2025 13, Jun 2025

Rome

4750$

Cyber Security Specialist

16, Jun 2025 20, Jun 2025

Berlin

4750$

Cyber Security Specialist

22, Jun 2025 26, Jun 2025

Tunisia

3250$

Cyber Security Specialist

22, Jun 2025 26, Jun 2025

Jeddah

2750$

Cyber Security Specialist

07, Jul 2025 11, Jul 2025

Prague

4750$

Cyber Security Specialist

14, Jul 2025 18, Jul 2025

Zurich

4750$

Cyber Security Specialist

20, Jul 2025 24, Jul 2025

Amman

2750$

Cyber Security Specialist

21, Jul 2025 25, Jul 2025

Singapore

4950$

Cyber Security Specialist

04, Aug 2025 08, Aug 2025

Toronto

5500$

Cyber Security Specialist

10, Aug 2025 14, Aug 2025

Tunisia

3250$

Cyber Security Specialist

11, Aug 2025 15, Aug 2025

Madrid

4750$

Cyber Security Specialist

17, Aug 2025 21, Aug 2025

Manama

2750$

Cyber Security Specialist

17, Aug 2025 21, Aug 2025

Khobar

2750$

Cyber Security Specialist

24, Aug 2025 28, Aug 2025

Muscat

2750$

Cyber Security Specialist

01, Sep 2025 05, Sep 2025

London

4750$

Cyber Security Specialist

15, Sep 2025 19, Sep 2025

Barcelona

4750$

Cyber Security Specialist

06, Oct 2025 10, Oct 2025

Istanbul

2950$

Cyber Security Specialist

06, Oct 2025 10, Oct 2025

Milan

4750$

Cyber Security Specialist

13, Oct 2025 17, Oct 2025

Geneva

4750$

Cyber Security Specialist

19, Oct 2025 23, Oct 2025

Doha

3500$

Cyber Security Specialist

20, Oct 2025 24, Oct 2025

Kuala Lumpur

3250$

Cyber Security Specialist

27, Oct 2025 31, Oct 2025

Jakarta

3500$

Cyber Security Specialist

02, Nov 2025 06, Nov 2025

Marrakesh

2950$

Cyber Security Specialist

03, Nov 2025 07, Nov 2025

Paris

4750$

Cyber Security Specialist

16, Nov 2025 20, Nov 2025

Beirut

2750$

Cyber Security Specialist

17, Nov 2025 21, Nov 2025

Milan

4750$

Cyber Security Specialist

30, Nov 2025 04, Dec 2025

Sharm ElShaikh

2750$

Cyber Security Specialist

08, Dec 2025 12, Dec 2025

Munich

4750$

Cyber Security Specialist

14, Dec 2025 18, Dec 2025

Beirut

2750$

Cyber Security Specialist

21, Dec 2025 25, Dec 2025

Riyadh

2750$

Cyber Security Specialist

22, Dec 2025 26, Dec 2025

Brussels

4750$

Cyber Security Specialist

28, Dec 2025 01, Jan 2026

Muscat

2750$

Have a look too on these courses