Course Duration 1 Day - Face-To-Face Intructor Led Workshop 
Course Fee Available upon request (Write to us at
Course Location  Customer Onsite and TLC (Karachi) 
Course Code TN226
Deliverables Comprehensive Student Guide and Workshop Certificate

This on-site couse can also be conducted for customers in Lahore, and Islamabad
In the era of digital transformation, the importance of information security and cybersecurity have been emerged as an essential education/training and is recommended to take by users from all LOB’s as a part of an organizational internal security policy helping them to understand and combat against latest types of threats, risk and vulnerabilities. 

This training is designed to provide the supposed to provide all participants with core skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and aware the corporate users how to secure systems and infrastructures lincluding end-point-devices.  

The core reason is to bring all users on one page helping them to explore the reason behind why the protection of information is important. Protection of information is considered as one of the critical function for all enterprises. Cybersecurity is a growing and rapidly changing field and it is vital that the principal concepts that frame and define this increasingly pervasive field are clearly understood by technology professionals who are involved and concerned with the security implications of information Technologies. This workshop is designed for this purpose, as well as to provide the insight into the importance of cybersecurity, and the integral role of cybersecurity professionals.

The training course flow will be a mix of lectures & classroom discussions so that participants can have a detailed understanding of various components of cybersecurity technologies.

After completing this workshop, you will be able to:

  • Understand basic information and cybersecurity concepts and classifications.
  • Recognize malware analysis concepts and methodology used by hackers.
  • Distinguish system and application security threats and vulnerabilities.
  • Classify types of incidents.
  • Understand security event correction tools.
  • Be aware of the basic concepts, practices, tools, tactics, techniques and procedure used today by cybercriminals.
  • Elaborate basic security principles, guidelines and procedures to safeguard data.
  • Understanding Data Encryption and types of encryptions.
  • Describe why data encryption is important.
  • Understand Identity Theft Protection and how Multifactor Authentication can help in reducing the overall implications with typical scenarios.
  • Exploiting “Users” role in Information Security.
This workshop shall be delivered by TOGAF 9 Certified/IBM Certfied Infrastructure System Architect and an experienced trainer with 25+ years of career experience imparting education and training services both locally and internationally and have worked for international enterprise technology vendors including IBM, Fujitsu, and ICL. Our instructor holds various industry professional certifications in the space of enterprise servers and storage technologies, Information Security, Enterprise Architecture, ITIL, Cloud, Virtualization, Green IT, and a co-author of 10 IBM Redbooks. 

This workshop is intended for resources who/from:

  • Different LOB's including business, application, audit, risk, compliance, information security, IT operations, project management, and legal professionals with a familiarity of basic IT/IS concepts who want to;
  • Want to learn new basic trends in Information Security and cybersecurity.
  • Want to explore the new trends of cyber threats, risks and overall vulnerabilities attched with emerging technologies.
  • Students and fresh graduates.
  • CXO's, Managers, Senior IT and Business Leaders who want to refresh thier present knowledge in the field of information and cybersecurity.
This workshop can also be delivered for an organization at their premises with 40% reduction is the cost subject to 10 -15 corporate users taking this session from different LOB’s.

In a nut shell, this workshop shall increase the focus on information and cybersecurity to protect sensitive data and systems. No organization, regardless of size or industry, is immune to cyberattacks, and just one breach could cause significant financial, reputational or regulatory consequences. However, an effective control environment can reduce the likelihood of a breach, enhance incident detection and response, and accelerate recovery efforts to limit damage.

Moreover, two criteria can help determine the effectiveness of a data security methodology. First, the cost of implementing the system should be a small fraction of the value of the protected data. Second, it should cost a potential hacker more, in terms of money and/or time, to compromise the system than the protected data is worth.

Participants attending this workshop should be familiar with basic Information Technology (IT) and Security concepts, business challenges and the role of general system wide infrastructure technologies and their applications. 

  • Unit 1 – Understanding the Role of Information and Cybersecurity
    • A little backdrop on recent cyber attacks in Pakistan
    • World is getting instrumented, interconnected & intelligent.
    • Exponential Data Growth – Some key facts and figures.
    • The evolution of storage technology and future predictions.
    • Assume a world without a security.
    • Most Frequently Targeted Industries in 2018.
    • Why a security is becoming a board room discussion.
    • Key Security Concerns for the Executive Management.
    • Security Vs. Safety in a view.
    • How to avoid Social Engineering & Malicious Software.
    • Hacker tricks to avoid – Recommendations.
    • Understanding Cybersecurity and Cyberspace.
    • Differences between Information Security and Cybersecurity.
    • Multiple layers of protection offered by Security Solutions.
    • Why securing your environment is important?
    • More devices than Humans – One of the serious concern.
    • What is Information Security.
    • Information Security and Dependability.
    • Why you need to make security a priority.
    • Types of cybersecurity threats.
    • Malware Detection.
    • Why is Cyber Resilience needed.
    • Top 11 ways poor security issues that can harm you.
    • Security – Defense in depth.
    • Security Awareness – The 6 Layered Model.
    • Blueprint for Cybersecurity Success.
    • What are the objectives of Cyber Security?
    • Adoption of Cybersecurity best practices.
    • Cybersecurity Awareness – Summary.
    • Questions you should ask your Services Provider.
    • Careers in information and cybersecurity.
    • Typical roles security specialist in the industry.

    Unit 2 -Basic Security Principles and Guidelines

    • Why Data Protection is important for organizations?
    • Understanding security guidelines and principles.
    • Basic guidelines for setting up a user password.
    • Tips for keeping your password secure.
    • The six basic Cybersecurity Principles.
    • Understanding Data Encryption and types of encryptions.
    • Describing Symmetric and Asymmetric Encryptions.
    • The 8 Principles of Cybersecurity Laws.
    • Goals and Principles of Cybersecurity –The larger picture.
    • About National Response Center for Cyber Crime –Pakistan.
    • Center of Internet Security Guidelines: Top 20 Cybersecurity Controls.
    • Describing Identity Theft Protection.
    • Understand Multifactor Authentication and typical scenarios.
    Unit 3 – Unit 3 -Dealing with Risks, Threats and Vulnerabilities
    • Understand Fault Tolerance and Fault Resilience.
    • Examining the Cost of aData Breach.
    • To address security threats, leaders must avoid following common myths.
    • Understand Incidents, Breaches, Risk & Vulnerability.
    • Use five fundamental security principles to help guide you.
    • Threats, Motives and Methods.
    • Threats and security challenges faced today.
    • Understand Threat management.
    • Different threat levels and risks.
    • Knowing security threats and their channels.
    • Understanding Security Elements –The larger picture.
    • Risk Management: Know your risks.
    • The role of Risk Management.
    • Defense Planning –Risk Analysis and Assessments.
    • Risk Management Approach, key objectives and benefits.
    • A small backdrop on ISO 27001.
    • 12 main sections of ISO 27002.
    • Qualitative Risk Assessment –Simple and Detailed Risk Assessment
    • Security Challenges for Data Storage Ecosystem.
    • Security risks and solutions in the digital transformation age.
    • Possible vulnerabilities that one cannot ignore.
    • Types of Comprehensive Vulnerability Assessments.
    • Elements of Risks.
    • Threat, Risk and Vulnerability –A High Level Summary.
    Unit 4 – Understanding Users Role in Information Security
    • Endpoint security issues caused by users.
    • What is Role?
    • Understanding “Users” role in Information Security.
    • Differentiating between the role of Data Steward and Data Custodian.
    • Users role in Information Security.
    • Safeguarding Institutional Data.
    • Protecting Electronic Data, Safeguard your Passwords, Secure Your Computer, Protecting Physical Data, Disposing of Data (Data Sanitization).
    • Safeguarding Electronic Communications.
    • Avoid Risky Behavior Online.
    • Block or allow pop-ups in your Web Browsers – An important step.
    • Check and remove malware from your computer – Windows.
    • Tips to help you stay more secure online – A Brief Summary.
    • Report any Suspected Security Breach.
    • Adhere to the Computing Policy.
    • Additional Information –Guidelines.



    List of IBM AIX Operating System 
    Standard Courses

    AIX 7 Basics

    Power Systems for AIX II - AIX Systems Administration

    Power Systems for AIX III - Advanced Administration and Problem Determination

    Introduction to AIX Korn Shell Scripting - AIX 7,1, AIX 6.1, AIX 5.3 and Linux

    AIX 7 Jumpstart for UNIX Professionals

    Security for Power Systems AIX

    IBM POWER Virtualization Technologies

    AIX Disk Storage Management and Recovery Procedures

    AIX Performance Monitoring and Management

    Introduction to IT Infrastructure Technologies

    Understanding the Role of Storage Technologies and Big Data

    Linux Basics for Users


    List of IBM AIX Operating System 
    Short-Term Courses

    AIX System Configuration Devices & AIX System Storage Overview

    AIX Disk Storage Management & Recovery Procedures

    AIX Performance Monitoring & Management

    Understanding & Managing AIX ODM (Object Data Manager)

    Security for Power Systems AIX

    AIX Software Installation Maintenance & Backup & Restotore

    Working with Logical Volume Manager & File System Administration

    AIX Error Monitoring & System Dump Facility & AIX Scheduling

    AIX Security & User Administration