SlideShare a Scribd company logo
1 of 5
Download to read offline
TRAINING WEEK 2013
COURSE OUTLINE
MAY 13-17 2013
The Carlton Savannah Hotel
Port of Spain, Trinidad, W.I.
Training Week 2013.May 13-17 2013.Carlton Savannah.
Page1
FACILITATOR’S BIOGRAPHY
Barry D. Lewis, CISSP, CISM, CGEIT, CRISC is the
President of Cerberus ISC Inc and has over 40 years of
experience in information technology, specializing in
Information Security for the last 30 years. He began work
in the consulting field in 1987 and worked for two major
audit firms before starting joining Cerberus ISC Inc in 1993.
He was awarded the John Kuyers Best Speaker/Conference Contributor Award
in 2008. He is co-author of numerous books, including Computer Security for
Dummies, Teach Yourself Windows 2000 Server in 21 Days and Wireless
Networks for Dummies. His books have been translated into numerous
languages around the world.
Barry lectures and consults world-wide on numerous security topics, including
Windows Active Directory, IT Governance, wireless networking and vulnerability
testing.
Training Week 2013.May 13-17 2013.Carlton Savannah.
Page2
HANDS-ON CORPORATE CYBER FORENSICS: 2 DAYS (HANDS-ON)
In this introductory two day session attendees will learn the basic approach to Windows based forensics,
what is involved, how to approach evidence and how to use readily available tools to assist in evidence
gathering.
Attendees will also learn proper forensic approaches, evidence gathering and legal ramifications, although
emphasis will be on internal corporate investigations and not court cases.
SESSION HIGHLIGHTS
 Understand how to properly perform an
investigation.
 Understand chain of custody
 Learn how to create a forensic lab
 Hands-on lab environment used for
demonstration & discussion purposes
 Detailed discussion of output and results
obtained from each part of the assessment
 Listing of reference material for appropriate
techniques and tools
SESSION OBJECTIVES
Participants will be equipped to properly investigate Windows systems and obtain relevant data using
forensically sound investigative techniques and tools.
LAB EXERCISES
 Learn how MD5 hashes work by using a
hashing program to verify copies of evidence
 Use a physical write blocker to copy a disk
(will be shared among participants)
 Participate in evidence seizure following
proper protocols
 Create a clean drive using special disk wipe
software
 Search for deleted files on a disk
 Recover deleted files from Recycler and
elsewhere
 Create a forensically sound drive image
 Perform a memory dump to collect evidence
 Create an Alternate Data Stream to hide a
file
 Search for and find an Alternate Data Stream
 Change Windows to show Hidden files
 Analyze cookies and temporary files
 View Explorer cache files using Cache View
 Analyze password recovery tools
 Review demo based commercial forensic
products.
Training Week 2013.May 13-17 2013.Carlton Savannah.
Page3
IT AUDIT FUNDAMENTALS: 2 DAY (SEMINAR)
This two day seminar outlines the key concepts of information technology needed in order to understand
how best to audit the environment. You will learn how to conduct an audit, understand important
frameworks, ensure key security controls are present and ensure business continuity.
You will learn to focus on key risks and controls in such critical areas as user access, network security,
database controls and change management. You will leave the seminar confident in your ability to
understand and audit an enterprise IT system.
SESSION HIGHLIGHTS
 Steps for conducting an IT Audit including planning, developing the audit program, fieldwork, wrap-up
and reporting.
 Key IT Audit Risks
 Audit areas include information security, IT operations, application development, change management,
database and network security.
SESSION OBJECTIVES
 Recognize the key steps in an audit
 Clearly understand the various technologies in use in today’s enterprises
 Understand how to audit databases, operating systems, networks and other key aspects of IT
Training Week 2013.May 13-17 2013.Carlton Savannah.
Page4
SOCIAL NETWORKING RISKS & CONTROLS: 1 DAY (SEMINAR)
This session explores the risks and potential controls of social networking tools and will invite discussion on
where the benefits lie and whether risks can be adequately controlled.
The session will also help prepare you to adequately manage that risk.
SESSION HIGHLIGHTS
 Review of the various social networking tools available today and their use in a business context.
 How can social networking be controlled within a business.
 Privacy and security controls and the risks associated in social networking tools.
SESSION OBJECTIVES
 Recognize the main social networking sites.
 Clearly understand the various uses in the business world.
 Understand the risks and assess the possible controls.

More Related Content

What's hot

FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedPhillip Stalnaker
 
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)Security Bootcamp
 
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...Jürgen Ambrosi
 
Security Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an InhibitorSecurity Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an Inhibitorsecratic
 
Security @ large scale
Security @ large scaleSecurity @ large scale
Security @ large scaleBishan Singh
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Monitoring the Data Center
Monitoring the Data CenterMonitoring the Data Center
Monitoring the Data CenterLancope, Inc.
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injectionA. Shamel
 
Ransomware: The Impact is Real
Ransomware: The Impact is RealRansomware: The Impact is Real
Ransomware: The Impact is RealNICSA
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending NetworkSwarna Gautam
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 ThreatsKim Jensen
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateAndy Bochman
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 

What's hot (20)

FinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-OptimizedFinalCode-At-A-Glance-Webcopy-Optimized
FinalCode-At-A-Glance-Webcopy-Optimized
 
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
SBC 2012 - Dynamic Access Control in Windows Server 2012 (Nguyễn Ngọc Thuận)
 
Network-Security
Network-SecurityNetwork-Security
Network-Security
 
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
2° Ciclo Microsoft Fondazione CRUI 7° Seminario: Proteggersi dai Cyber Attack...
 
Security Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an InhibitorSecurity Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an Inhibitor
 
Security @ large scale
Security @ large scaleSecurity @ large scale
Security @ large scale
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Monitoring the Data Center
Monitoring the Data CenterMonitoring the Data Center
Monitoring the Data Center
 
Database Security
Database SecurityDatabase Security
Database Security
 
Data base security and injection
Data base security and injectionData base security and injection
Data base security and injection
 
Ransomware: The Impact is Real
Ransomware: The Impact is RealRansomware: The Impact is Real
Ransomware: The Impact is Real
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending Network
 
MITx_Cyber security_Syllabus
MITx_Cyber security_SyllabusMITx_Cyber security_Syllabus
MITx_Cyber security_Syllabus
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
 
GridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security UpdateGridWise 2010 Cyber Security Update
GridWise 2010 Cyber Security Update
 
Self defending networks
Self defending networksSelf defending networks
Self defending networks
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Network security
Network securityNetwork security
Network security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 

Similar to ISACA TT Training Week Course Outline 2013 (final)

STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxaudeleypearl
 
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017David Sweigert
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework helpOlivia Fournier
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...360 BSI
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE360 BSI
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfssuser0a78bf
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015Minded Security
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...360 BSI
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperlincktello
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-ShivelyProcess_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-ShivelyCurious Geoff (Shively)
 

Similar to ISACA TT Training Week Course Outline 2013 (final) (20)

STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docxResearch Paper TopicITS835 – Enterprise Risk Managemen.docx
Research Paper TopicITS835 – Enterprise Risk Managemen.docx
 
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
Cybersecurity Framework: NIST will host a public workshop on May 16-17, 2017
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
Cybersecurity Management Principles, 11 - 14 Sept 2017 KL, Malaysia / 17 - 20...
 
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAECybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
Cybersecurity Management Principles, 12 - 15 Nov 2017 Dubai, UAE
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdfSecurity, Compliance and Identity Partner Enablement Resource Guide.pdf
Security, Compliance and Identity Partner Enablement Resource Guide.pdf
 
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015Matteo Meucci   Software Security in practice - Aiea torino - 30-10-2015
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
 
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
Cybersecurity Management: Preventing Data Breaches in the Age of Big Data, 25...
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaper
 
Ssdf nist
Ssdf nistSsdf nist
Ssdf nist
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-ShivelyProcess_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
Process_to_Produce_Secure_Software-DHS_White-House_Geoff-Shively
 
Dr. Charles Pak
Dr. Charles PakDr. Charles Pak
Dr. Charles Pak
 

ISACA TT Training Week Course Outline 2013 (final)

  • 1. TRAINING WEEK 2013 COURSE OUTLINE MAY 13-17 2013 The Carlton Savannah Hotel Port of Spain, Trinidad, W.I.
  • 2. Training Week 2013.May 13-17 2013.Carlton Savannah. Page1 FACILITATOR’S BIOGRAPHY Barry D. Lewis, CISSP, CISM, CGEIT, CRISC is the President of Cerberus ISC Inc and has over 40 years of experience in information technology, specializing in Information Security for the last 30 years. He began work in the consulting field in 1987 and worked for two major audit firms before starting joining Cerberus ISC Inc in 1993. He was awarded the John Kuyers Best Speaker/Conference Contributor Award in 2008. He is co-author of numerous books, including Computer Security for Dummies, Teach Yourself Windows 2000 Server in 21 Days and Wireless Networks for Dummies. His books have been translated into numerous languages around the world. Barry lectures and consults world-wide on numerous security topics, including Windows Active Directory, IT Governance, wireless networking and vulnerability testing.
  • 3. Training Week 2013.May 13-17 2013.Carlton Savannah. Page2 HANDS-ON CORPORATE CYBER FORENSICS: 2 DAYS (HANDS-ON) In this introductory two day session attendees will learn the basic approach to Windows based forensics, what is involved, how to approach evidence and how to use readily available tools to assist in evidence gathering. Attendees will also learn proper forensic approaches, evidence gathering and legal ramifications, although emphasis will be on internal corporate investigations and not court cases. SESSION HIGHLIGHTS  Understand how to properly perform an investigation.  Understand chain of custody  Learn how to create a forensic lab  Hands-on lab environment used for demonstration & discussion purposes  Detailed discussion of output and results obtained from each part of the assessment  Listing of reference material for appropriate techniques and tools SESSION OBJECTIVES Participants will be equipped to properly investigate Windows systems and obtain relevant data using forensically sound investigative techniques and tools. LAB EXERCISES  Learn how MD5 hashes work by using a hashing program to verify copies of evidence  Use a physical write blocker to copy a disk (will be shared among participants)  Participate in evidence seizure following proper protocols  Create a clean drive using special disk wipe software  Search for deleted files on a disk  Recover deleted files from Recycler and elsewhere  Create a forensically sound drive image  Perform a memory dump to collect evidence  Create an Alternate Data Stream to hide a file  Search for and find an Alternate Data Stream  Change Windows to show Hidden files  Analyze cookies and temporary files  View Explorer cache files using Cache View  Analyze password recovery tools  Review demo based commercial forensic products.
  • 4. Training Week 2013.May 13-17 2013.Carlton Savannah. Page3 IT AUDIT FUNDAMENTALS: 2 DAY (SEMINAR) This two day seminar outlines the key concepts of information technology needed in order to understand how best to audit the environment. You will learn how to conduct an audit, understand important frameworks, ensure key security controls are present and ensure business continuity. You will learn to focus on key risks and controls in such critical areas as user access, network security, database controls and change management. You will leave the seminar confident in your ability to understand and audit an enterprise IT system. SESSION HIGHLIGHTS  Steps for conducting an IT Audit including planning, developing the audit program, fieldwork, wrap-up and reporting.  Key IT Audit Risks  Audit areas include information security, IT operations, application development, change management, database and network security. SESSION OBJECTIVES  Recognize the key steps in an audit  Clearly understand the various technologies in use in today’s enterprises  Understand how to audit databases, operating systems, networks and other key aspects of IT
  • 5. Training Week 2013.May 13-17 2013.Carlton Savannah. Page4 SOCIAL NETWORKING RISKS & CONTROLS: 1 DAY (SEMINAR) This session explores the risks and potential controls of social networking tools and will invite discussion on where the benefits lie and whether risks can be adequately controlled. The session will also help prepare you to adequately manage that risk. SESSION HIGHLIGHTS  Review of the various social networking tools available today and their use in a business context.  How can social networking be controlled within a business.  Privacy and security controls and the risks associated in social networking tools. SESSION OBJECTIVES  Recognize the main social networking sites.  Clearly understand the various uses in the business world.  Understand the risks and assess the possible controls.