Cyber security Control for IT-Team

4
Tesseract Consulting Pvt Ltd 710, Rupa Solitaire, MBP, Mahape, Navi Mumbai- 400 710 +91-22-27782670 [email protected] www.tesseractserv.com Training on Cyber-Security Control for IT-Team ©2016 Tesseract and its products, All rights reserved.

Transcript of Cyber security Control for IT-Team

Page 1: Cyber security Control for IT-Team

Tesseract Consulting Pvt Ltd

710, Rupa Solitaire, MBP, Mahape, Navi Mumbai- 400 710

+91-22-27782670 [email protected] www.tesseractserv.com

Training on Cyber-Security Control for IT-Team

©2016 Tesseract and its products, All rights reserved.

Page 2: Cyber security Control for IT-Team

©2016 Tesseract and its products, All rights reserved.

Cyberspace is constantly evolving and

presenting organizations with new

opportunities, as the desire of businesses

to quickly adopt new technologies, such

as using the Internet to open new

channels and adopting cloud services,

provides vast opportunity. But, it also

brings unanticipated risks and inadvertent

consequences that can have a potentially

negative impact.

Tesseract is committed to solve the cyber

security challenges for businesses who

seek to enhance the technologies and

employees to protect from advance

threat patterns. This course is compiled

specifically for IT team to explore the

intensity of diverse and emerging cyber

-attacks and their advanced pattern.

INTRODUCTION

Page 3: Cyber security Control for IT-Team

Course Syllabus

©2016 Tesseract and its products, All rights reserved.

1. Inventory of Authorized and Unauthorized Devices

2. Inventory of Autorized and Unauthorized Software

3. Secure Configurations for Hardware and Software

on Mobile Devices, Laptops,

Workstations and Servers

4. Continuous Vulnerability Assessment

and Remediation

5. Malware Defences

6. Application Software Security

7. Wireless Device Controll

8. Data Recovery Capability

9. Exclusive Security for C-Level Executives

10. Secure Configurations for Network Devices

such as Firewalls, Routers and Switches

11. Limitation and Control of Network Ports,

Protocols, and Services

12. Controlled Use of Administrative Privileges

13. Boundary Defense

14. Maintenance, Monitoring and Analysis

of Audit Logs

15. Controlled Access Based

on the Industry Standards

16. Account Monitoring and Controll

17. Data Loss Prevention

18. Incident Response and Management

19. Secure Network Engineering

20. Penetration Tests and Red Team Exercises

Page 4: Cyber security Control for IT-Team

©2016 Tesseract and its products, All rights reserved.

BENEFITS

STRONGER SECURITY: Helps to design stronger security infrastructure

APT AWARENESSClarity on Advanced Persistence Threats

COVERING POSSIBILITIESGuides to cover possibilities of Cyber-attacks to enter network

WAYS TO BE UPDATEDHelps IT teams to stay updated

with rapidly growing threats