Security Operations and Administration Training Course
Security Operations and Administration refers to the practices, processes, and procedures involved in managing and maintaining the security of an organization's information systems and networks.
This instructor-led, live training (online or onsite) is aimed at beginner-level security administrators who wish to deepen their understanding of security practices within an organization.
By the end of this training, participants will be able to:
- Understand the fundamentals of security operations and administration.
- Identify and mitigate various security threats and vulnerabilities.
- Implement and manage security solutions.
- Understand legal and ethical considerations in security operations.
- Prepare for incident response and disaster recovery.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction to Security Operations and Administration
Fundamentals of Information Security
- Concepts of information security
- Security governance and policy
- Risk management
- Legal and compliance issues
Security Technologies and Controls
- Network security technologies
- Cryptography and access control mechanisms
- Endpoint security
- Cloud security fundamentals
Security Operations and Management
- Security Operations Center (SOC) fundamentals
- Incident response and management
- Security Information and Event Management (SIEM) tools
- Threat intelligence and analysis
Vulnerability Management and Penetration Testing
- Vulnerability assessment basics
- Penetration testing techniques
- Security auditing and reporting
Cybersecurity Frameworks and Best Practices
- Overview of common security frameworks
- Implementing security best practices
- Developing and maintaining security policies
Advanced Topics in Security Operations
- Advanced Persistent Threats (APT)
- IoT and mobile security challenges
- Emerging security technologies and trends
Leadership and Management in Security Operations
- Team leadership and management skills
- Communication and reporting in Security Operations
- Building and managing a security team
Summary and Next Steps
Requirements
- Basic understanding of security concepts
- Familiarity with networking concepts
Audience
- Security administrators
- Network administrators
Open Training Courses require 5+ participants.
Security Operations and Administration Training Course - Booking
Security Operations and Administration Training Course - Enquiry
Security Operations and Administration - Consultancy Enquiry
Consultancy Enquiry
Testimonials (5)
Pengaturan laporan dan aturan.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
Machine Translated
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
I genuinely enjoyed the real examples of the trainer.
Joana Gomes
Course - Compliance and the Management of Compliance Risk
Upcoming Courses (Minimal 5 peserta)
Related Courses
Introduction to ISO27001
7 HoursPelatihan langsung yang dipimpin instruktur di Indonesia (online atau di tempat) ini ditujukan untuk profesional tingkat pemula yang ingin memperoleh pemahaman tentang ISO 27001 dan perannya dalam meningkatkan keamanan informasi dalam suatu organisasi.
Pada akhir pelatihan ini, peserta akan dapat:
- Memahami tujuan dan manfaat ISMS.
- Membiasakan diri dengan konsep, istilah, dan prinsip utama ISO 27001.
- Mengenali peran auditor dalam memastikan kepatuhan.
- Dapatkan wawasan tentang proses audit dan perbaikan berkelanjutan dalam ISO 27001.
AI and IT Audit
14 HoursPelatihan langsung yang dipandu instruktur di Indonesia (online atau di tempat) ini ditujukan untuk auditor TI tingkat menengah yang ingin secara efektif menggabungkan alat AI dalam praktik audit mereka.
Pada akhir pelatihan ini, peserta akan dapat:
- Memahami konsep inti kecerdasan buatan dan bagaimana penerapannya dalam konteks audit TI.
- Memanfaatkan teknologi AI seperti pembelajaran mesin, NLP, dan RPA untuk meningkatkan efisiensi, akurasi, dan ruang lingkup audit.
- Lakukan penilaian risiko menggunakan alat AI, yang memungkinkan pemantauan berkelanjutan dan manajemen risiko proaktif.
- Integrasikan AI ke dalam perencanaan, pelaksanaan, dan pelaporan audit, sehingga meningkatkan efektivitas audit TI secara keseluruhan.
Micro Focus ArcSight ESM Advanced
35 HoursThis instructor-led, live training in Indonesia (online or onsite) is aimed at advanced-level security analysts who wish to elevate their skills in utilizing advanced Micro Focus ArcSight ESM content to improve an organization's ability to detect, respond, and mitigate cyber threats with greater precision and speed.
By the end of this training, participants will be able to:
- Optimize the use of Micro Focus ArcSight ESM to enhance monitoring and threat detection capabilities.
- Construct and manage advanced ArcSight variables to refine event streams for more precise analysis.
- Develop and implement ArcSight lists and rules for effective event correlation and alerting.
- Apply advanced correlation techniques to identify complex threat patterns and reduce false positives.
Basel III – Certified Basel Professional
21 HoursKeterangan:
Basel III adalah standar regulasi global mengenai kecukupan modal bank, uji ketahanan, dan risiko likuiditas pasar. Setelah awalnya disetujui oleh Komite Basel untuk Pengawasan Perbankan pada tahun 2010–11, perubahan pada The Accord telah memperpanjang penerapannya hingga 31 Maret 2019. Basel III memperkuat persyaratan modal bank dengan meningkatkan likuiditas bank dan mengurangi leverage bank.
Basel III berbeda dari Basel I & II karena ia mensyaratkan tingkat cadangan yang berbeda untuk berbagai bentuk simpanan dan jenis pinjaman lainnya, sehingga ia tidak begitu menggantikan keduanya melainkan berfungsi berdampingan dengan Basel I dan Basel II.
Lanskap yang kompleks dan terus berubah ini bisa jadi sulit untuk diikuti, kursus dan pelatihan kami akan membantu Anda mengelola kemungkinan perubahan dan dampaknya terhadap institusi Anda. Kami terakreditasi dan menjadi mitra pelatihan Basel Certification Institute dan dengan demikian kualitas dan kesesuaian pelatihan dan materi kami dijamin mutakhir dan efektif.
Tujuan:
- Persiapan untuk Ujian Profesional Basel Bersertifikat.
- Menentukan strategi dan teknik langsung untuk definisi, pengukuran, analisis, peningkatan, dan pengendalian risiko operasional dalam organisasi perbankan.
Sasaran Pemirsa:
- Anggota dewan dengan tanggung jawab risiko
- CRO dan Kepala Risiko Management
- Anggota Tim Risiko Management
- Staf kepatuhan, hukum, dan dukungan TI
- Analis Ekuitas dan Kredit
- Manajer Portofolio
- Analis Lembaga Pemeringkat
Ringkasan:
- Pengantar norma-norma Basel dan amandemen terhadap Kesepakatan Basel (III)
- Peraturan mengenai risiko pasar, kredit, rekanan dan likuiditas
- Pengujian stres untuk berbagai ukuran risiko termasuk cara merumuskan dan memberikan pengujian stres
- Dampak yang mungkin terjadi dari Basel III terhadap industri perbankan internasional, termasuk demonstrasi penerapan praktisnya
- Perlunya Norma Basel Baru
- Norma Basel III
- Tujuan Norma Basel III
- Basel III – Garis Waktu
CCTV Security
14 HoursPelatihan langsung yang dipandu instruktur di Indonesia (online atau di tempat) ini ditujukan untuk manajer keamanan yang ingin mempelajari keterampilan pengawasan dan manajemen keamanan CCTV tingkat dasar hingga menengah.
Pada akhir pelatihan ini, peserta akan dapat:
- Kenali jenis-jenis sistem CCTV dan ketahui manfaat serta fiturnya.
- Memahami persyaratan pemasangan kabel dan sistem CCTV.
- Pasang, konfigurasikan, dan kelola sistem CCTV.
Certified Fraud Examiner (CFE) Preparation
70 HoursPelatihan langsung yang dipimpin instruktur di Indonesia (online atau di lokasi) ini ditujukan untuk profesional tingkat lanjut yang ingin mendapatkan pemahaman komprehensif tentang konsep pemeriksaan penipuan dan mempersiapkan diri untuk ujian Certified Fraud Examiner (CFE).
Pada akhir pelatihan ini, peserta akan mampu:
- Dapatkan pengetahuan komprehensif tentang prinsip pemeriksaan penipuan dan proses pemeriksaan penipuan.
- Belajar mengidentifikasi, menyelidiki, dan mencegah berbagai jenis skema penipuan keuangan.
- Memahami lingkungan hukum terkait penipuan, termasuk unsur hukum penipuan, undang-undang, dan peraturan terkait.
- Dapatkan keterampilan praktis dalam melakukan investigasi penipuan, termasuk pengumpulan bukti, teknik wawancara, dan analisis data.
- Belajar merancang dan menerapkan program pencegahan dan pencegahan penipuan yang efektif dalam organisasi.
- Dapatkan kepercayaan diri dan pengetahuan agar berhasil lulus ujian Certified Fraud Examiner (CFE).
CGEIT – Certified in the Governance of Enterprise IT
28 HoursDescription:
This four day event (CGEIT training) is the ultimate preparation for exam time and is designed to ensure that you pass the challenging CGEIT exam on your first attempt.
The CGEIT qualification is an internationally recognised symbol of excellence in IT governance awarded by ISACA. It is designed for professionals responsible for managing IT governance or with significant advisory or assurance responsibility for IT governance.
Achieving CGEIT status will provide you with wider recognition in the marketplace, as well as increased influence at executive level.
Objectives:
This seminar has been designed to prepare Delegates for the CGEIT examination by enabling them to supplement their existing knowledge and understanding to be better prepared to pass the exam, as defined by ISACA.
Target Audience:
Our training course is for IT and business professionals, with significant IT governance experience who are undertaking the CGEIT exam.
CipherTrust Manager
21 HoursThis instructor-led, live training in Indonesia (online or onsite) is aimed at IT professionals who wish to understand how to use the CipherTrust Solution suite.
By the end of this training, participants will be able to:
- Understand the CipherTrust Solution and its basic functions.
- Evaluate device architecture and usage schemes.
- Manage CipherTrust product suite.
Compliance for Payment Services in Japan
7 HoursThis instructor-led, live training in Indonesia (online or onsite) is aimed at payment services compliance professionals who wish to create, implement, and enforce a compliance program within an organization.
By the end of this training, participants will be able to:
- Understand the rules set forth by government regulators for payment service providers.
- Create the internal policies and procedures needed to satisfy government regulations.
- Implement a compliance program that adheres to relevant laws.
- Ensures that all corporate processes and procedures comply with the compliance program.
- Uphold the business's reputation while protecting it from lawsuits.
Cybersecurity Governance, Risk & Compliance (GRC)
14 HoursPelatihan langsung yang dipandu instruktur di Indonesia (online atau di tempat) ini ditujukan untuk profesional keamanan siber tingkat menengah yang ingin meningkatkan pemahaman mereka tentang kerangka kerja GRC dan menerapkannya pada operasi bisnis yang aman dan patuh.
Pada akhir pelatihan ini, peserta akan dapat:
- Memahami komponen utama tata kelola, risiko, dan kepatuhan keamanan siber.
- Melakukan penilaian risiko dan mengembangkan strategi mitigasi risiko.
- Menerapkan langkah-langkah kepatuhan dan mengelola persyaratan peraturan.
- Mengembangkan dan menegakkan kebijakan dan prosedur keamanan.
Governance, Risk Management & Compliance (GRC) Fundamentals
21 HoursCourse goal:
To ensure that an individual has the core understanding of GRC processes and capabilities, and the skills to integrate governance, performance management, risk management, internal control, and compliance activities.
Overview:
- GRC Basic terms and definitions
- Principles of GRC
- Core components, practices and activities
- Relationship of GRC to other disciplines
HIPAA Compliance for Developers
7 HoursHIPAA (Health Insurance Portability and Accountability Act of 1996) is a legislation in the United States that provides provisions for data privacy and security for handling and storing medical information. These guidelines are a good standard to follow in developing health applications, regardless of territory. HIPAA compliant applications are recognized and more trusted globally.
In this instructor-led, live training (remote), participants will learn the fundamentals of HIPAA as they step through a series of hands-on live-lab exercises.
By the end of this training, participants will be able to:
- Understand the basics of HIPAA
- Develop health applications that are compliant with HIPAA
- Use developer tools for HIPAA compliance
Audience
- Developers
- Product Managers
- Data Privacy Officers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice.
Note
- To request a customized training for this course, please contact us to arrange.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Indonesia (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
Compliance and the Management of Compliance Risk
21 HoursAudiance
All staff who need a working knowledge of Compliance and the Management of Risk
Format of the course
A combination of:
- Facilitated Discussions
- Slide Presentations
- Case Studies
- Examples
Course Objectives
By the end of this course, delegates will be able to:
- Understand the major facets of Compliance and the national and international efforts being made to manage the risk related to it
- Define the ways in which a company and its staff might set up a Compliance Risk Management Framework
- Detail the roles of Compliance Officer and Money Laundering Reporting Officer and how they should be integrated into a business
- Understand some other “hot spots” in Financial Crime – especially as they relate to International Business, Offshore Centres and High-Net-Worth Clients
PCI-DSS Practitioner
14 HoursPelatihan Profesional Industri Kartu Pembayaran langsung yang dipandu instruktur di Indonesia (online atau di tempat) ini memberikan kualifikasi individual bagi praktisi industri yang ingin menunjukkan keahlian profesional dan pemahaman mereka tentang Standar Keamanan Data PCI (PCI DSS).
Pada akhir pelatihan ini, peserta akan dapat:
- Pahami proses pembayaran dan standar PCI yang dirancang untuk melindunginya.
- Memahami peran dan tanggung jawab entitas yang terlibat dalam industri pembayaran.
- Memiliki wawasan dan pemahaman mendalam tentang 12 persyaratan PCI DSS.
- Menunjukkan pengetahuan tentang PCI DSS dan bagaimana penerapannya pada organisasi yang terlibat dalam proses transaksi.