Cyber security Control for IT-Team
-
Upload
rajneesh-g -
Category
Business
-
view
27 -
download
2
Transcript of Cyber security Control for IT-Team
Tesseract Consulting Pvt Ltd
710, Rupa Solitaire, MBP, Mahape, Navi Mumbai- 400 710
+91-22-27782670 [email protected] www.tesseractserv.com
Training on Cyber-Security Control for IT-Team
©2016 Tesseract and its products, All rights reserved.
©2016 Tesseract and its products, All rights reserved.
Cyberspace is constantly evolving and
presenting organizations with new
opportunities, as the desire of businesses
to quickly adopt new technologies, such
as using the Internet to open new
channels and adopting cloud services,
provides vast opportunity. But, it also
brings unanticipated risks and inadvertent
consequences that can have a potentially
negative impact.
Tesseract is committed to solve the cyber
security challenges for businesses who
seek to enhance the technologies and
employees to protect from advance
threat patterns. This course is compiled
specifically for IT team to explore the
intensity of diverse and emerging cyber
-attacks and their advanced pattern.
INTRODUCTION
Course Syllabus
©2016 Tesseract and its products, All rights reserved.
1. Inventory of Authorized and Unauthorized Devices
2. Inventory of Autorized and Unauthorized Software
3. Secure Configurations for Hardware and Software
on Mobile Devices, Laptops,
Workstations and Servers
4. Continuous Vulnerability Assessment
and Remediation
5. Malware Defences
6. Application Software Security
7. Wireless Device Controll
8. Data Recovery Capability
9. Exclusive Security for C-Level Executives
10. Secure Configurations for Network Devices
such as Firewalls, Routers and Switches
11. Limitation and Control of Network Ports,
Protocols, and Services
12. Controlled Use of Administrative Privileges
13. Boundary Defense
14. Maintenance, Monitoring and Analysis
of Audit Logs
15. Controlled Access Based
on the Industry Standards
16. Account Monitoring and Controll
17. Data Loss Prevention
18. Incident Response and Management
19. Secure Network Engineering
20. Penetration Tests and Red Team Exercises
©2016 Tesseract and its products, All rights reserved.
BENEFITS
STRONGER SECURITY: Helps to design stronger security infrastructure
APT AWARENESSClarity on Advanced Persistence Threats
COVERING POSSIBILITIESGuides to cover possibilities of Cyber-attacks to enter network
WAYS TO BE UPDATEDHelps IT teams to stay updated
with rapidly growing threats