ADVERTISEMENT: The key to stopping cyber attacks is knowledge. SENS is the perfect place to learn
The need for people with expertise in cybersecurity is even greater. Targeted attacks and cybercrime are something that still appears in the news picture, and companies need expertise that can stop attacks.
But the expertise does not come by itself. Proper training and proper certification are essential to stay up to date on digital threats.
Join Copenhagen in August!
One of the perhaps most current places to update your knowledge in cyber security is Copenhagen between 22 and 27 August. This is when the SANS conference kicks off, and there is a wide range of courses, training and other activities.
After years of limited physical presence, you can take advantage of being able to meet speakers, and other participants, to exchange experiences and complete face-to-face physical training courses.
And the event in Copenhagen has four exciting, educational courses and lectures to choose from. These courses are really going to require you to be able to roll up your sleeves and get into the subject matter.
For example, training in how to deal with data breaches and what kind of tools hackers use. SEC504the course (Hacker Tools, Techniques, and Incident Handling) takes to say how effective responses to the burglary have to be, as the attacks still have new methods. The course will showcase these tools and let the participants test them themselves.
The goal is to understand how hackers proceed to attack a system. It provides insight and greater perception of the threats. At the same time, participants will gain a better understanding of what and attack impact, and learn to respond dynamically to it.
Read more and sign up for her! »
How to hunt for threats
If you want to train in advanced techniques to detect and stop an attack, is FOR508The course (Advanced Incident Response, Threat Hunting & Digital Forensics) is for you. Hunting threats is essential to both prevent new attacks and minimize damage if the attack has already occurred. The course will show the best tools for the task, and explain how to attack even from the most advanced actors: nations or organized criminal groups.
Good internal safety policies are just as important to avoid prevention. That is why it is important to train IT staff and others who work with security in the organization. The key to good threat management is CIS Controls, and seen with actions related to the protection of digital values.
The actions go step by step through what must be done to secure the organization and the surrounding ecosystem. SEC566The course (Implementation and revision of security frameworks and controls) explains how to use CIS Controls in the best possible way, together with practical teaching, is a highlight of the conference.
Real hands-on exercises
There will also be in-depth safety training around ICS (industrial control systems).
On ICS612The ICS Cybersecurity in-depth course will teach participants to identify threats and vulnerabilities, and to learn how to secure ICS systems against them. This is necessary so that the participants already have a good knowledge of the topic, as this is very advanced content. The course will help to understand how proactive measures to prevent or delay attacks, recognize vulnerable and lead complex ICS environments.
The course involves a lot of practical training in a setup that should most closely resemble an ICS environment in the real world. Setup in timber includes connection to and business network, which includes data transfer, remote access and other typical business functions.
Several of the courses are associated with GIAC certifications.
Finally – attending the conference in Copenhagen will also give you access to one NetWarstournament, which is a set of challenges that allow you to compete against others and practice your skills.
Not least, it will be a good opportunity for social gatherings and networks.