Security Testing and Evaluation: Dates and Fees

Security Testing and Evaluation: Exams and Stuff

Security Testing and Evaluation: Sidebar Content

Course

Fees A$ Per Person

Practical Network Security: Course Contents

1. Introduction
2. Audiences for information security metrics
3. Types of information security metrics
4. Sources of metrics
5. Using the GQM method
6. Metametrics (metrics about metrics)
7. The metrics lifecycle
8. An information security measurement system
9. Conclusion

Practical Network Security: Dates and Fees

Practical Network Security: Exams and Stuff

Practical Network Security: Sidebar Content

Course Format

The course is delivered in Live Virtual format. It is not a pre-recorded video course. Participants are encouraged to interact with the trainer and each other, with opportunities to ask questions and discuss genuine business situations, challenges and approaches. Bring real-world security measurement issues to the session and come away with pragmatic solutions.

There are hands-on exercises to practice and learn the techniques as a group.

The course workbook stimulates you to think and make your own notes rather than simply read someone else’s, while the course textbook supports supplementary in-depth study.

Fees per person

Security Metrics (2 days)

**10% Discount for AISA members.
You must quote your membership number in the comments section and select the Pay By Invoice option during the online registration process.

Course fees include:

Practical Network Security: Course Overview

The Quest for Better Metrics

Despite organisations having managed their information risks and security controls for decades, most still struggle with the related measurements, begging big questions about the nature of that ‘management’. It could be argued that the lack of appropriate metrics is partly, perhaps largely responsible for the ongoing stream of information security incidents, privacy breaches, ransomware attacks and the like, plus the shortages of skilled cybersecurity professionals. The quest for better metrics – and professionals who truly understand this stuff – is becoming ever more urgent as the profession matures and expectations rise.

Light on mathematics, statistics and theory, the course provides a wealth of practical tips and techniques, giving you the tools and the confidence to make real progress on this challenging topic. The course emphasises real-world challenges, situations and applications for the tools and techniques, with exercises to try-out new techniques in a safe environment.

This 2-day course moves rapidly through the basics to cover advanced topics likely to be of interest to experienced professionals in senior roles. Although the course directly addresses measurement challenges in information risk and security management, the tools and techniques are more broadly applicable making the learning equally valuable for other metrics used elsewhere in the business. It covers but extends well beyond the technical/cybersecurity metrics typically used at an operational level e.g. in network security.

Tailoring to Your Situation

When it comes to metrics, there is no off-the-shelf list of ‘good practice’ metrics you can simply adopt. Numerous example metrics are discussed during the course to illustrate the pros and cons of various measurement, analysis and reporting approaches. They serve to demonstrate and practice the tools and techniques you will use to craft a custom suite of information security measures for your organisation given its unique business situation and goals, information risks, security controls, maturity level and compliance obligations. Rather than supplying an ill-fitting uncomfortable off-the peg suit(e) of generic metrics, this course teaches you the tailoring skills you need to shine.

Practical Network Security: Learning Outcomes

Practical Network Security: Who Should Attend

This course is designed for experienced professionals in senior roles, including:

Network Penetration Testing: Course Overview

Penetration testing in general and vulnerability scanning in particular is the process of assessing computer
systems, networks and applications for vulnerabilities (weaknesses). It is a part of the overall process required to
secure a computer system, network or application. Vulnerability Exploitation is commonly carried out after a computer system, network or application has been found to be vulnerable and is thus part of the audit process to secure a computer system, network or application.

Network Penetration Testing: Learning Outcomes

This workshop involves three key aspects of penetration testing:

These tools provide an insight into penetration testing commencing at the network layer leading to the application
layer.