CyberAudit and Cybersecurity curriculum offers a wide range of lecture and hands-on courses. They are designed for internal audit, IT auditor, and information security professionals, focusing on technical topics related to Cyber controls including: networking. data security, privacy, identity management, access controls, and specific technologies. The curriculum is divided into sections to ease viewing on the website.
CyberAudits of Identity and Access Control Management (CY01)
You will receive a framework for consistent and effective auditing of logical access controls.
CyberSecurity Audits of Microsoft Windows Server and Active Directory Security (CY20) – UPDATED
In this practical, information packed seminar, you will learn a structured approach to securing and auditing Microsoft servers and networking infrastructure, including Active Directory, from end-to-end and from top to bottom.
CyberSecurity on the Go: Auditing Mobile Applications (CY21)
This seminar addresses the business advantages of mobile computing as well as the emerging issues of how to control mobile devices, protect corporate assets and maintain compliance with relevant legislation and data privacy standards.
CyberSecurity Risk Assessments: Identifying and Reporting (CY91)
This course will cover the essential background information, resources, and techniques necessary to execute meaningful CyberSecurity risk assessments. Important common “red flag” CyberSecurity risks will be highlighted. Concepts and techniques will be reinforced through the use of group exercises associated with risk assessment.
Intrusion Analysis and Incident Response (CY17) – NEW
This course will provide you with an understanding of the various attack characteristics, an analysis of lessons learned from recent attacks, and allow you to create your own processes for responding to attacks of your enterprise network. You will learn from “live” events and scenarios from actual computer incidents.
Is Your Data Really Secure ???…13 Ways to Avoid Cyber Data Leaks (CY40)
We will heighten your awareness by pinpointing “A Dirty Baker’s Dozen”: 13 common CyberSecurity Leakage Exposures and How to Avoid Them.
Linux as an Audit Target…and as an IT Audit Tool (CY22)
In this pragmatic seminar, we will identify the important Unix/Linux security controls, best practice for secure configuration, and tools and techniques on how to audit Linux and other Unix variants
Overview of Amazon Web Services Controls (CY05) – NEW
AWS enables SAP, SharePoint, Exchange to be accessible throughout the world via the Internet. Content-based systems including the education content application Blackboard used by many universities, streaming systems providing entertainment, news and advertising content, and shopping systems all rely on AWS and similar products. Security of these systems is of paramount importance.