EVENT

FoxAcademy

The IT security industry and the threat landscape are ever-changing, and the need to stay a step ahead of the cyber criminals is of critical importance across different industries. The best IT departments invest in educating their employees, as the human factor is always the critical frontier in defending an organisation against hackers. To help our clients protect their businesses, FortConsult is launching our academy, kicking off with 2 training courses this fall.

Attack & Defend Training

What is the current threat landscape and how are attacks typically set up?

This four-day course teaches your employees about the mind-set and techniques of a typical hacker. By understanding the hacker’s thought process and attack vectors, an employee becomes better equipped to spot and withstand an attack on your organisation.

Your employees will learn about how an attack is initiated and the different stages that it typically consists of, and about how attackers circumvent security and which trails they might leave behind.

First Responder Training

How to react to a cyber-attack, and which factors play a major role in how you mitigate the damage?

The purpose of this one-day course is to equip your employees with an understanding of incident response, data collection and initial triage and analysis. Understanding the factors that play a role in how you manage an incident is key to mitigating the potential damage. The world’s best incident response teams always try to leverage the inside knowledge of the onsite personnel, as they know the local infrastructure better than anyone. However, few employees are familiar with the decisive factors in a cyber crisis, and it is critical to educate them, so that they are able to react efficiently and accordingly, while the professional help is on the way.

Attending this course will teach your employees about the key factors in handling a security incident, give them an understanding of basic forensic principles and how to act on those, and help them handle (potentially) compromised systems and collect relevant data.

Read more about this training here.