Course
SICHAR
Cyber Security for ICT («SICHAR»)
How is modern cybersecurity implemented in ICT in a practical way? Current attack vectors and threats are demonstrated in a tangible way and learned through hands-on labs. In addition, a structured quick audit of cyber exposure is carried out.
Duration
1 day
Price
980.–
Course documents
Slide-Handout, additional information
Course facts
- Strategic fundamentals: ISMS, risk management, and cybersecurity
- Understanding cyber threats using established frameworks (e.g., MITRE ATT&CK®*) and relevant threat intelligence sources
- Your own OSINT quick audit to analyze your organization's cyber exposure
- Fundamentals of threat intelligence and cyber exposure management
- Efficiently creating and adapting of AI concepts, regulations, and guidelines with GPTs
- Elementary approval processes for maintaining the cyber security architecture
- Fundamentals of cyber security engineering, incorporating system, cloud, hybrid, and network security according to best practices (e.g., CIS benchmarks)
- Fundamentals of SOC, DFIR, and DevSecOps setup and integration
- Fundamentals of a critical incident response plan (CIRT, decision-making bodies, emergency teams, procedures, etc.)
- Planning audits and penetration tests for continuous review of the ICT architecture
*MITRE ATT&CK® is a registered trademark of The MITRE Corporation.
The course combines strategic fundamentals with practical methods and focused exercises:
1 Strategic overview
- ISMS, risk management, and cybersecurity as the foundation of modern security architectures
2 Cybersecurity engineering
- Proven methods for architecture planning
- Preventive measures: system and cloud hardening
- Network security principles
- Threat intelligence, threat monitoring, and continuous cyber threat management
- Use of AI-GPTs for the efficient creation of security concepts, regulations, and guidelines
3 Joint practical exercises
- Quick audit of your own cyber exposure with OSINT sources
- Analysis of current attack tactics, techniques, and complex attack chains
- Development of strategies and measures for optimal preparation for cyber incidents
4 In-depth organizational approaches
- SOC & DFIR integration, coordination with BCM
- Integration of DevSecOps approaches to strengthen resilience
In this course, you will work with practical tools and methods:
- A prepared analysis and exercise environment is available for all participants.
- In interactive hands-on labs, you will use realistic attack scenarios—especially ransomware—to develop strategies and security architectures that can be transferred into practice.
- In addition, we will show you how AI-supported GPT models can be used in a targeted manner to efficiently design and adapt security concepts, regulations, and guidelines.
This course is aimed at ICT architects, IT security officers, project managers, developers, engineers, and decision-makers who want to recognize the current threats to ICT and understand and plan appropriate countermeasures.
Experience in the daily use of information technologies and basic network knowledge, analogous to the knowledge imparted in the following courses: