Cybersecurity II Training (Face-to-Face)

Africa/Nairobi
Nairobi, Kenya

Nairobi, Kenya

Description

Training Overview

The Cybersecurity II is a face-to-face training which will be held in Nairobi, Kenya from 17 - 21 April, 2023.

Building on the Cybersecurity I held in November 2022, this year's training will be hands-on, fused with a number of exciting simulated lab sessions. It will be conducted by a team of renowned industry experts in Cybersecurity led by Dr. Bright Gameli Mawudor. Dr. Gameli is a Cybersecurity expert, 2016’s/2021’s Top 40 Under 40 winner, and featured in Tribe of Hackers. He is also the founder of AfricaHackhon. For more information about the Lead Trainer, please check his profile: Dr. Bright Gameli Mawudor.

The training will also focus on establishment and operation of a (regional) RREN CSIRT platform which is the key deliverable of the AfricaConnect3 Cybersecurity Strategy.

Target Audience

The Cybersecurity II Training is restricted to the NREN technical staff in Cybersecurity, Networks, Trust & Identity, Systems Administration and Service Portfolio.

Cybersecurity II Training is Co-funded by European Commission

    • Day 1: Participants Network and Settle
    • Day 1: Morning Session

      • Threat Landscape
      • Cyber threat profiling of organizations
      • Maturity and capability levels
      • Security Architecture Reference Model
      • Cyber Security Strategic RoadMap Development
      • Adoption of ZeroTrust Model

    • Day 2: Lunch Break
    • Day 1: Afternoon Session

      • Threat Modelling in depth
      • Practical Deep Dive into the Mindset of a Cyber Criminal
      • Use cases and practical by Delegates

    • Day 2: Morning Session

      • Introduction to Cloud computing
      • Cloud Threat Model, Risks & Vulnerabilities
      • Cloud Governance
      • Cloud Security and Audit
      • Cloud Security Engineering for corporate networks

    • Day 2: Lunch Break
    • Day 2: Afternoon Session

      • UseCases of Cloud Security and Practical deep dive into various toolset

    • Day 3: Morning Session

      • Digital Forensics Investigation (Red vs Blue Teaming)
      • Morning Session
      • Modernizing Security Operation Center
      • Threat Data Management
      • Data Security
      • Identity & Access Management
      • Open Security Ecosystem

    • Day 3: Lunch Break
    • Day 3: Afternoon Session

      • SIEM vs SOAR
      • Threat Intelligence Operation Model
      • Re-Designing your Security Operation Centre
      • Mitre ATT&CK Framework
      • Incidence Response & Threat Hunting
      • UseCase Development for corporate network

    • Day 4

      Recap and practice

    • Day 4: Lunch Break