Main Training Topic

  • IS and Digital Forensics

Course Code

  • 08/TP/ISDF/02

Training Type

  • Practical Workshop
Upcoming Events

Others various programs

Recent and Upcoming Events

  • Follow Us

Cyber War & Cyber Intelligence

Cyber warfare is already with us today — distributed denial-of-service (DDoS) attacks have been launched against many military and government computer systems around the world in recent years. Advancements in information technology have made tech-dependent countries more vulnerable to disruption — physical security is now tied to cyber security.Cyber weapons are a relatively new type of weaponry. Most of the them are freely available on the internet but some more sophisticated and newer ones are kept privately or are commercial.Securing infrastructure against cyber-attacks has become one of the highest priorities for every nation. To do this, networks, systems and operations teams that support them must be fully trained and aware of the possible threats and how to defend against them.

The objective of this course is to provide practical and usable information to professionals on how to protect both infrastructure and data from the destruction of cyber terrorism and associated cybercrimes.


  • Understand the basic principles and philosophies of cyber terrorism and how individuals and corporations can be targeted
  • Identify possible threats facing your organization information assets and infrastructure
  • Provide your organization with complete assessment of organizational security policy, design and implementation.
  • What are legal constraints on cyber warfare
  • Main defence strategy
  • Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces

What you’ll take away from this course:

  • Course manual
  • Lab scenarios and manual


  • Introduction
  • Information Warfare
  • Cyber Doctrine and Strategy
  • Cyber Weapons & Cyber Attack
  • Cyber Crime and Investigation
  • Computer Emergency Response Teams
  • Cyber Attack Case Study


Open to members of public and private security  professionalsThis Master Class is specifically designed for key decision makers in both government agencies ad private sectors:  

  • Senior officers from government & not-for- profit sector
  • GMs, Profit-Centre Managers who have assumed security/IT
  • Auditors who need to build deeper technical skills
  • Penetration tester and Ethical hackers
  • Corporate Attorneys / Legal Professionals
  • Engineers / Technical Managers
  • Product & Marketing Managers
  • IT manager
  • Security supervisor


Through the use of practical examples, case studies and exercises you will learn the different types of security problems that are faced in the protection of organizations computer systems and its impact on the organization. We ensure at the very end of this seminar, with your "valued-added" knowledge coupled with your functional skills set will be a key asset to any organization.


essay writing service


The consultants commitment to a project is highly professional. We would be more than pleased to recommend his services without hesitation.

Shammi from Messe Frankfurt

Read more››

Copyright © 2019 Lorin. All Rights Reserved.

show bar
November 12, 2019
essay writer
term paper
term paper writing
term paper writing service
research paper help