Tickets left at the box office for collection may be picked up on the day, during the hour before the performance starts. Please take the credit card used to make the booking and the Ticketmaster booking reference number as proof of purchase.
Ticketmaster UK: 0870 154 40 40, International: 00 44 161 385 3500
Monday - Saturday 10:00 - 18:00 and occasionally on Sunday.
Infra red hearing system with no deposit required. For special needs seating please call 0844 412 4648. Disabled toilet situated in the rear Stalls with ground level access There is no limit to the amount of Guide Dogs (within reason of course)
Course Overview
Every organization is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will not only offer liability protection; it will also increase efficiency and productivity.
With our Cyber Security workshop your participants will understand the different types of malware and security breaches. Develop effective prevention methods which will increase overall security. They will also understand the basic concepts associated with Cyber Security and what a company needs to stay secure.
Target Audience:
There is no Eligibility Criteria for this training, anyone can attend this training
Prerequisites:
There are no prerequisites for this course.
Course Materials:
Students will receive a course manual with presentation slides and reference materials.
Examination:
No Exam
Technical Requirements:
For eBooks:
Internet for downloading the eBook
Laptop, tablet, Smartphone, eReader (No Kindle)
Adobe DRM supported software (e.g. Digital Editions, Bluefire Reader)
eBook download and activation instructions
Agenda:
Module One: Getting Started
Icebreaker
Housekeeping Items
The Parking Lot
Workshop Objectives
Module Two: Cyber security Fundamentals
What is Cyberspace?
What is Cyber security?
Why is Cyber security Important?
What is a Hacker?
Case Study
Module Two: Review Questions
Module Three: Types of Malware
Worms
Viruses
Spyware
Trojans
Case Study
Module Three: Review Questions
Module Four: Cyber Security Breaches
Phishing
Identity Theft
Harassment
Cyberstalking
Case Study
Module Four: Review Questions
Module Five: Types of Cyber Attacks
Password Attacks
Denial of Service Attacks
Passive Attack
Penetration Testing
Case Study
Module Five: Review Questions
Module Six: Prevention Tips
Craft a Strong Password
Two-Step Verification
Download Attachments with Care
Question Legitimacy of Websites
Case Study
Module Six: Review Questions
Module Seven: Mobile Protection
No Credit Card Numbers
Place Lock on Phone
Don’t Save Passwords
No Personalized Contacts Listed
Case Study
Module Seven: Review Questions
Module Eight: Social Network Security
Don’t Reveal Location
Keep Birthdate Hidden
Have Private Profile
Don’t Link Accounts
Case Study
Module Eight: Review Questions
Module Nine: Prevention Software
Firewalls
Virtual Private Networks
Anti-Virus & Anti-Spyware
Routine Updates
Case Study
Module Nine: Review Questions
Module Ten: Critical Cyber Threats
Critical Cyber Threats
Cyber terrorism
Cyberwarfare
Cyberespionage
Case Study
Module Ten: Review Questions
Module Eleven: Defense Against Hackers
Cryptography
Digital Forensics
Intrusion Detection
Legal Recourse
Case Study
Module Eleven: Review Questions
Module Twelve: Wrapping Up
Words from the Wise
Review of Parking Lot
Lessons Learned
Completion of Action Plans and Evaluations
Course Description:
The IT-Security Foundation course is a two-day course aimed at developing basic knowledge about securing and defending an IT infrastructure environment. The slides cover all examination topics; no additional literature is required to prepare students for the exam.
Course Topics:
Day 1:
● Introduction to IT-Security Foundation
● Learning objectives
● Security in Networks, Systems and Software
● Understanding the different types of computer systems and their vulnerabilities from a security point of view
● Understanding TCP/IP networking
● IP and IPV4 security, Wi-Fi and attacks on networks
● Relevance of understanding applications and application vulnerabilities
Day 2:
● Security in Networks, Systems and Software
● Understanding databases and database vulnerabilities
● Security through Cryptography and Access Control
● Understanding cryptography in terms of implementing effective security measures
● Definition of identification and examples of identity attributes
● Common (Ab)use Cases
● Understanding cloud computing and the related risks
● Understanding how cybercriminals exploit vulnerabilities to be able to implement appropriate security controls
● Summary of all modules
● Refer to Summary / Recapitulation activities
Learning Goals:
The course provides candidates with an overview of the most important technological aspects of an IT infrastructure. The main aim of the course is to help candidates acquire a global understanding of the security impact of each of these technological aspects.
Course Agenda:
The course consists of three modules:
● Module 1: Security in Networks, Systems and Software
● Module 2: Security through Cryptography and Access Control
● Module 3: Common (Ab)use Cases
Who can Attend?
● Managers who wish to understand more clearly what is required from security specialists without engaging in technical details, and
● Professionals who wish to attend further specialised security trainings in the future
Cash, MC, Visa, Discover, and AMEX
Tickets held at Will Call can be picked up as early as 1 hour prior to event at the front of the building on the West side. (Alcaniz Street).
(850) 432-0800 - General Info
10am - 4pm Monday - Friday. Event hours vary and posted at Box Office.
This is an accessible venue.
Course Description:
Disagreements, differences of opinion and conflicting perspectives on key issues inevitably arise in any context where people are working together.
Research has shown that workplace conflicts can become highly destructive. Negative emotions may be stirred up, poisoning team morale, creating stress and destroying relationships.
Conflict may emerge between managers and their staff, between team members or departments.
Conflict may be expressed openly, but it may also be hidden, in the form of irritation, resentment, loss of morale and lack of commitment. Hidden conflict is easy to miss and therefore can be particularly damaging.
Ultimately, this is likely to have an adverse effect on team and company performance, costing time and money.
It is therefore vital to manage conflict constructively.
As an team member and leader, your ability to deal with and resolve conflicts defines your success in the longer term.
Our one day workshop in Conflict Management and Communication Skills immerses you in the most advanced conflict management tools, strategies and practices applicable today. You will gain hands on practice on proven frameworks, go through simulations and exercises that will train you to be highly effective professional and leader, starting day one.
Course Topics:
1) Science behind workplace conflicts 2) Understanding Human Behaviour 3) Different Personality Types 4) Conflict Management Styles 5) Conflict Management Strategies 6) Workplace Conflicts 7) Conflict Resolution Agreements 8) Working with difficult people 9) Relationship and reputation management
Course Features:
Learning Objectives:
Getting a handle on and gaining insights into your conflict management style through self-assessments (TKI®).
Role playing to practice techniques and new skills in a safe environment.
Proven best practices for approaching conflict management.
Practices for resolving conflict as a third party mediator.
Scientifically validated frameworks on effective communication in stressful situations.
Transferring your learning back to your work environment using job aids, templates and other resources.
How You Will Benefit:
Build trust and credibility with colleagues and team members
Leverage potential conflict situations as opportunities for critical conversations that enhance work relationships.
Gain confidence in holding difficult conversations calmly and assertively.
Manage difficult situations proactively.
Increase your effectiveness in managing conflict.
See growth in your overall performance
Certification:
Once after the training we will provide you the course completion certificate.
CashCheckAmExVisaMC
Pick up tickets 1 hour prior to show. Customers must present the actual credit card used to place the order and a photo ID.
(212) 586-6510
Monday - Wednesday 10am - 8pm Thursday - Saturday 10am - 8:30pm
It's back! The AI & Big Data Expo Global, the leading Artificial Intelligence & Big Data Conference & Exhibition is taking place on 17-18th March 2020 at the Olympia in London. It will showcase the next generation technologies and strategies from the world of Artificial Intelligence & Big Data, providing an opportunity to explore and discover the practical and successful implementation of AI & Big Data to drive your business forward in 2020 and beyond.
Our high-level conferences will bring together forward thinking brands, market leaders, AI & Big Data evangelists and hot start-ups to explore and debate the advancements in Artificial Intelligence & Big Data, the impacts within Enterprise & Consumer sectors as well as Development platforms and Digital Transformation opportunities.
Visitors at the show will include IT decision makers, developers & designers, heads of innovation, Chief Data Officers, Chief Data Scientists, brand managers, data analysts, start-ups, innovators, tech providers, and VCs.
The dedicated AI & Big Data Conference tracks include; Enterprise AI & Digital Transformation, Data Analytics for AI & IoT, Big Data Strategies, AI and the Consumer, Developing AI Technologies and Big Data for Industry.
The AI & Big Data Expo will be co-hosted alongside the IoT Tech Expo, the largest global gathering for the Internet of Things sector, the Blockchain Expo and the Cyber Security & Cloud Expo. As a whole, the event will attract in excess of 13,000 attendees for two days of insightful content covering the whole ecosystem surrounding AI, Big Data, IoT, Blockchain, Cyber Security & Cloud.
For more information regarding the event head over to our website here.