There has been an evident surge in malware, phishing, and distributed denial of services since the onset of the pandemic across the Commonwealth of Australia. With the intent to take appropriate actions against these threat actors, the region along with its member states and international partners are to reinforce their collaboration on technical operations at judicial as well as diplomatic levels.
Organizations today, need to not only move beyond compliance and implement dynamic security integration through a multi layered approach, but also need to embrace an enterprise wide culture of cyber risk ownership. To achieve optimum cyber resilience and safeguard business continuity, a dynamic risk management framework is extremely essential for organizations.
The recent release of the Australian Cyber Security Strategy 2020 will give a much-needed incentive to the creation of a secure digital ecosystem to safeguard the nations citizens, business community and critical infrastructure functionality.
EC Council’s CISO MAG as an enabler of strategic community integration has planned a crisp half day virtual engagement designed to create more awareness on the need for cybersecurity and its related implications in these testing times.
The Australia CISO Confluence will derive realistic insights from senior industry experts on how to redefine security frameworks, mitigate threats and encourage a new culture of cybersecurity to sustain continuity across the region’s business intensive digital ecosystems.
The worlds most advanced ethical hacking course with 20 of the most current security domains an ethical hacker will want to know when planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 270 attack technologies, commonly used by hackers. Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification!
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. Vulnerability Analysis
6. System Hacking
7. Malware Threats
8. Sniffing
9. Social Engineering
10. Denial-of-Service
11. Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. IoT Hacking
19. Cloud Computing
20. Cryptography
October 26th-29th 2020 at 10 am – 1 a.m UTC
EC-Council Certified Ethical Hacker (CEH) Live Course
CEH Printed Courseware (US courses Only)
CEH iLabs, Live Labs/Cyber Range
CEH Certification Exam
Exam Insurance Program
CEH Online Self-Paced Streaming Video Course (1 year access)
CEH Practical Exam – Live Cyber Range Challenge (Up to 6 hours)
CEH CyberQ Practice Exam
CPENT (Pen-Test) Course:
CPENT Online Self-Paced Streaming Video Course (1 year access)
CPENT E-Courseware
iLabs (6 Months Access)
Practice Range (90 days Access)
CPENT Live Range Exam
Exam Insurance Program
CHFI (Computer Forensics) Course:
CHFI Online Self-Paced Streaming Video Course (1 year access)
CHFI E-Courseware
CHFI iLabs, Live Labs/Cyber Range
CHFI Certification Exam
Exam Insurance Program
Cybersecurity *Meet Up Networking Event (Priceless)
20% OFF Voucher for next course
*Meet-ups are subject to availability, space, instructor schedules, and local interest. For live in person only.
The CCISO program trains individuals who are looking to make the jump from middle management to the executive ranks by focusing on high-level management skills specifically needed for IS executives. From project to audit management, procurement and finance, to strategy and policy, students will be taught to steer complex security programs strategically and successfully. The CCISO program was created and is taught by sitting high-level information security executives from across industries, resulting in the most relevant, challenging, and applicable content on the market.
1. Definitions
2. Information Security Management Program
3. Information Security Laws, Regulations, & Guidelines
4. Privacy Laws
1. Design, Deploy, and Manage Security Controls in Alignment with Business Goals, Risk Tolerance, and Policies and Standards
2. Information Security Risk Assessment
3. Risk Treatment
4. Residual Risk
5. Risk Acceptance
6. Risk Management Feedback Loops
7. Business Goals
8. Risk Tolerance
9. Policies and Standards
10. Understanding Security Controls Types and Objectives
11. Implementing Control Assurance Frameworks
12. COBIT (Control Objectives for Information and Related Technology)
13. BAI06 Manage Changes
14. COBIT 4.1 vs. COBIT 5
15. ISO 27001/27002
16. Automate Controls
17. Understanding the Audit Management Process
1. The Role of the CISO
2. Information Security Projects
3. Security Operations Management
1. Access Controls
2. Physical Security
3. Disaster Recovery
4. Network Security
5. Threat and Vulnerability Management
6. Application Security
7. Systems Security
8. Encryption
9. Computer Forensics and Incident Response
1. Security Strategic Planning
2. Alignment with Business Goals and Risk Tolerance
3. Relationship between Security, Compliance, & Privacy
4. Leadership
5. Enterprise Information Security Architecture (EISA) Models, Frameworks, and Standards
6. Security Emerging Trends
7. It’s all about the Data
8. Key Performance Indicators (KPI)
9. Systems Certification and Accreditation Process
10. Resource Planning
11. Financial Planning
12. Procurement
13. Vendor Management
14. Request for Proposal (RFP) Process
15. Integrate Security Requirements into the Contractual Agreement and Procurement Process
16. Statement of Work
17. Service Level Agreements
October 26th-29th 2020 at 10 am – 1 a.m UTC
EC-Council Certified CISO (CCISO) Live Course
CCISO Printed Courseware (US courses Only)
CCISO Certification Exam
Exam Insurance Program
CCISO Online Self-Paced Streaming Video Course (1 year access)
Risk Management Approach & Practices:
Risk Management Approach and Practices Deep Dive Online
Self-Paced Streaming Video Course
RM E-Courseware
CertifIed Project Manager:
Certified Project Manager (CPM) Online Self-Paced Streaming Video Course
CPM E-Courseware
CPM Exam Voucher - $1899
Automatic invitation and free pass to Global CISO Forum, EC-Council’s annual executive invite-only event
Cybersecurity *Meet Up Networking Event (Priceless)
20% off Voucher for next course
Certified Secure Computer User (CSCU) License up to 100 users**
Oh Phish license [One free OhPhish License capable of launching one email phishing simulation campaign for up to 2,000 users and is valid for 3 months after activation.]
*Meet-ups are subject to availability, space, instructor schedules, and local interest. For live in person only.
**You have 1 year from the date of training to request Certified Secure Computer User (CSCU) License
In this one-day course you will set up EC-Council’s Mobile Security Toolkit (STORM) OS to interface with your drone, then learn about drone hacking. This will include a wide arrange of topics from the basics of drones and the FCC rules, to the capture, examination, and exploitation of drone data.
Module 01: Technical Introduction Drone Hacking
Module 02: Drone Ethics
Module 03: Part 1 Robotics as an ecosystem
Module 04: Part 2 Ground Stations: Servers / Cloud
Module 05: Drone Hacking
October 28th October 2020
1. e-Book (1 Year Access)
2. Certificate of Attendance (.pdf)
3. Tello Drone Quadcopter
4. iLabs, Online Labs (6 months Access)
5. EC-Council Drone Program Carry case
6. Alfa Long-Range Dual-Band AC1200 Wireless USB 3.0 Wi-Fi Adapter w/2x 5dBi External Antennas
7. EC-Council Drone Program T-shirt
Group Chief Information Officer,
Cover More Insurance
Chairman,
Australian Information Security Association
Chief Technology Officer,
E.L & C. Baillieu Limited
Director of Information Security,
ResMed
Chief Information Security Officer,
The Smith Family
Managing Partner,
ICTLC Australia
Chief Chief Officer & Chief Security Officer,
Sport Integrity Australia
Chief Technology Officer,
Kips McGarth Education Centers
Partner Cyber Security,
EY
Chief Information Security Officer,
WiseEnergy
Chief Information Security Officer, Tyro Payments & Chairman of the Board, itSMF Australia
SVP Cyber Security Responsive Services Division, CyberSecurity Malaysia, President DFRS
|
|
|
|
|
|
|