KASPERSKY SECURITY INTELLIGENCE SERVICES · Highly interactive workshop is instructor-led by one...
Transcript of KASPERSKY SECURITY INTELLIGENCE SERVICES · Highly interactive workshop is instructor-led by one...
KASPERSKY SECURITYINTELLIGENCESERVICES
KASPERSKY SECURITY INTELLIGENCE SERVICES
NON-IT AWARENESS IT SECURITY TRAINING
CYBERSECURITY AWARENESS: THE COURSES
Non-IT Security Awareness
Training
USERS ARE THE WEAKEST LINK:
SECURITY AWARENESS TRAINING CAN:
More than 80% of all cyber incidents are caused by human errors.
Enterprises lose millions recovering from staff-related incidents.
Decrease number of security incidents by up to
90%,
Reduce monetary losses associated with cyber risks by 50-60%
up to 93% probability of the knowledge being used in daily life..
NON-IT AWARENESS
CYBERSAFETY CULTURE ASSESSMESNT- Chief Information Security Officers
- Analyse actual everyday user behaviour
- Understand areas to focus on
- See how employees view IT Security
- Understand the balance between security
and business efficiency
- Justify internal and external activities of the
- Security Department
CYBERSAFETY MANAGEMENT GAMES- Line managers
- Topic 1. “Know your enemies: people,
not computers”
- Topic 2. “You don’t have to be a target to be a victim”
- Topic 3. “Cybersafety is everyone’s responsibility”
Highly interactive workshop is instructor-led by one
of Kaspersky Lab’s qualified instructors.
KASPERSKY INTERACTIVE PROTECTION SIMULATION- Senior managers
Corporate
Industrial
Financial
Government
For IT, Business and Security – strategy simulation
for cybersecurity decision-makers.
Fun, engaging and fast (2 hours)
Team-work builds cross-divisional co-operation
Competition fosters initiative & analysis skills
Gameplay develops an understanding of cybersecurity measures and strategy
Teams compete at running a simulated enterprise and earning money
EMPLOYEE SKILLS TRAINING PLATFORM
Powered by:
Skills Assessment
Training Modules
Simulated attacks
Analytics and Reporting
- All Employees
EMPLOYEE SKILLS TRAINING PLATFORM- Skills Assessment
To determine the in-depth skills and training needs of the user. Covers various
security domains, includes predefined or random assessments, customer-defined questions, and
customizable length.
Auto-Enroll based on results.
- Threat Sim
EMPLOYEE SKILLS TRAINING PLATFORM
Ready-to-go customizable templates of phishing emails presenting various levels
of challenge. If the employee receiving the email clicks on the dangerous phishing link, he or she
experiences a teachable moment, and can be auto-assigned to the relevant training module.
EMPLOYEE SKILLS TRAINING PLATFORM- Training Modules
Learn by
doing
Fun and Engaging
Easy to Difficult migration
EMPLOYEE SKILLS TRAINING PLATFORM- Reporting
Results by Campaign, Group, Device Type, Repeat Offender, Location. Plus
supporting security posters, email templates, screensaver images.
IT Security Awareness
NON-IT AWARENESS IT SECURITY TRAINING
CYBERSECURITY AWARENESS: THE COURSES
DIGITAL FORENSICS
Introduction to Digital Forensics
Windows Registry Internals
Windows artefact's analysis
Browser Forensics
Email analysis
Skills gained
- Basic Digital Forensics takes place over five 8-hour days.
MALWARE ANALYSIS & REVERSE ENGINEERING- General Malware Analysis takes place over five 8-hour days.
Introduction to malware analysis
Static analysis techniques
Static analysis of applications
Windows internals
Dynamic analysis of a local data
Dynamic analysis of a network data
Non-Win32 analysis
Script analysis
ADVANCED DIGITAL FORENSICS
Deep Windows forensics
Data recovery
- Advanced Digital Forensics takes place over five 8-hour days.
Network and Cloud forensics
Memory forensics
Timeline analysis
Skills gained
ADVANCED MALWARE ANALYSIS & REVERSE ENGINEERING- General Malware Analysis takes place over five 8-hour days.
Dynamic analysis
Static shellcode analysis
APT reverse engineering
Protocol analysis
Rootkits and bootkits analysis
KASPERSKY INCIDENT RESPONSE TRAINING- Incident Response training takes place over 5 8-hour days.
Introduction to incident ResponseDEMOs
Detection and primary analysis
Digital analysis
Creating of detection rules
Skills gained
TRUE CYBERSECURITY POWERED BY INTELLIGENCE
SELECT A PRODUCT….
Endpoint
Security
Embedded System
Security
Storage
Security
Virtualization
Security
DDoS
Protection
Endpoint
Cloud
Mobile
Security
Security
Awareness
Training
Industrial
CyberSecurity
THANK YOU