Course Overview Cyber Security - Deloitte
Course Overview Cyber Security - Deloitte
Course Overview Cyber Security - Deloitte
Transform your PDFs into Flipbooks and boost your revenue!
Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.
<strong>Course</strong> <strong>Overview</strong><br />
<strong>Cyber</strong> <strong>Security</strong><br />
Sharpen your mind.<br />
<strong>Deloitte</strong> Academy<br />
2014
We believe it is important to share our knowledge with clients and business relations.<br />
For this reason, we want to offer you the opportunity to participate in a training<br />
course together with our <strong>Deloitte</strong> <strong>Security</strong> & Privacy professionals.<br />
This overview contains the following training courses:<br />
• CISSP Certification<br />
• CISM Certification<br />
• SAP <strong>Security</strong><br />
• Prepare for Privacy<br />
• HackLab: Hands-on Hacking<br />
• HackLab: Malware Analysis<br />
• HackLab: Introduction to <strong>Cyber</strong>crime<br />
• HackLab: SAP<br />
• ISO 27001 Implementation and Audit<br />
• SCADA <strong>Security</strong><br />
• Oracle GRC<br />
• SAP GRC<br />
• In-house training, custom training and learning programmes<br />
<strong>Cyber</strong>Lympics 2011, 2012 and 2013.<br />
<strong>Deloitte</strong> has extensive experience in the field of advising and assessing the information security within governments<br />
and business. Our team consists of more than 30 specialists that describe "ethical hacking" as their great passion.<br />
The knowledge, experience and passion are reaffirmed in the recent finals of the Global <strong>Cyber</strong>Lympics. The team of<br />
<strong>Deloitte</strong> Netherlands did win, for the third time in a row a contest which consisted of both offensive and defensive<br />
security challenges.
CISSP Certification<br />
The Certified Information Systems <strong>Security</strong> Professional (CISSP) certification is a globally<br />
recognized credential: the first of its kind and accredited by the American National<br />
Standards Institute (ANSI).<br />
<strong>Course</strong> objectives<br />
The <strong>Deloitte</strong> (ISC)2 CISSP Certification course is an intensive, five-day<br />
course that covers the most comprehensive compendium of<br />
information security best practices – the Common Body of Knowledge<br />
(CBK). The CISSP CBK establishes a common framework of<br />
information security terms and principles that allow information security<br />
professionals worldwide to discuss, debate and resolve matters<br />
pertaining to the profession, with a common understanding.<br />
The CISSP CBK consists of the following 10 domains:<br />
1. Access Control;<br />
2. Application <strong>Security</strong>;<br />
3. Business Continuity and Disaster Recovery Planning;<br />
4. Cryptography;<br />
5. Information <strong>Security</strong> and Risk Management;<br />
6. Legal, Regulations, Compliance and Investigations;<br />
7. Operations <strong>Security</strong>;<br />
8. Physical (Environmental) <strong>Security</strong>;<br />
9. <strong>Security</strong> Architecture and Design;<br />
10. Telecommunications and Network <strong>Security</strong><br />
The <strong>Deloitte</strong> CISSP certification course has a passing rate of over 90%<br />
as opposed to the average CISSP success rate of around 60%.<br />
Target audience<br />
Programme<br />
Day 1<br />
• Information <strong>Security</strong> Governance and<br />
Risk Management<br />
• <strong>Security</strong> Architecture and Design<br />
Day 2<br />
• Access Control<br />
• Application <strong>Security</strong><br />
• Operations <strong>Security</strong><br />
Day 3<br />
• Cryptography<br />
• Physical <strong>Security</strong><br />
Day 4<br />
• Networking<br />
• Business Continuity Planning<br />
Day 5<br />
• Business Continuity Planning<br />
• Legal and Regulatory<br />
• Sample exam (100 questions)<br />
Exam<br />
Participants will receive a voucher with which<br />
they can book an examination at a desired<br />
date and time at a Pearson VUE test centre<br />
of their choice.<br />
<strong>Security</strong> managers, risk managers, IT auditors, IT security<br />
professionals and security officers<br />
<strong>Course</strong> date and location<br />
This five-day course will be held on 3 – 7 March and on<br />
10 – 14 November 2014 in Amsterdam, the Netherlands.<br />
Costs<br />
The costs are EUR 2,995 ex VAT. Exam voucher, catering (lunch) and<br />
course materials are included in the price.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 2
CISM Certification<br />
CISM, Certified Information <strong>Security</strong> Manager, is a globally acknowledged information<br />
security management certification. This certification demonstrates you can connect<br />
information security to your organization’s business goals, understand the security aspects<br />
of new and current technologies, and possess the knowledge and skills to manage<br />
information security within your organization.<br />
<strong>Course</strong> objectives<br />
The <strong>Deloitte</strong> CISM certification course is a three-day course, which<br />
aims to prepare participants for successfully passing the CISM exam.<br />
The CISM certification indicates that participants understand a global<br />
framework of information security management concepts and<br />
principles. These can be applied to different situations, so information<br />
security is managed in the best way possible. Areas of interest include<br />
risk management, handling security incidents, compliance issues,<br />
managing information security programs and integrating information<br />
security into the business.<br />
The CISM framework clarifies the use of information security<br />
management in the organization, while it ensures its application is in<br />
sync with the organisation’s business goals. Information security<br />
management thus becomes more effective and efficient.<br />
The CISM course comprises four domains:<br />
1. Information security governance<br />
2. Information risk and compliance<br />
3. Information security program development and management<br />
4. Information security incident management<br />
Besides these four domains, exam preparation will be a significant part<br />
of the course.<br />
Programme<br />
Day 1<br />
• Introduction to CISM<br />
• Information security governance<br />
• Exercises<br />
Day 2<br />
• Information risk and compliance<br />
• Information security incident management<br />
• Exercises<br />
Day 3<br />
• Information security program<br />
development and management<br />
• Summary<br />
• Exam preparation<br />
Exam<br />
The exam can be taken on 14 June or 13<br />
December 2014. Participants have to<br />
register themselves at ISACA<br />
(www.isaca.org), up to 4 weeks prior to<br />
the exam.<br />
It is advisable to take the exam right after the<br />
training.<br />
Target audience<br />
(Information) <strong>Security</strong> managers (senior and junior level), business<br />
managers with information security in their portfolio, IT security<br />
professionals and security officers.<br />
<strong>Course</strong> date and location<br />
This three-day course will be held on 10 – 12 June and on 8 – 10<br />
December 2014 in Amsterdam, the Netherlands.<br />
Costs<br />
The costs are EUR 1,295 ex VAT. Catering (lunch) and course<br />
materials (CISM Review Manual and review questions) are included in<br />
the price. Exam fee is excluded.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 3
SAP <strong>Security</strong><br />
During this five-day course, we will facilitate an in-depth view of SAP security. Starting<br />
from the basic concepts, the most important SAP security options will be discussed. Since<br />
we believe in ‘doing is learning’, the course not only provides technical background: it<br />
includes plenty of opportunity to discuss practical use, benefits, constraints and real-life<br />
examples. More importantly, many hands-on exercises are included, challenging<br />
participants to put the theory into practise. <strong>Deloitte</strong> uses its own sandbox environments to<br />
this end.<br />
<strong>Course</strong> objectives<br />
If you have ever been involved with SAP and its security concept, you<br />
are most likely familiar with the term SAP_ALL. Developers say they<br />
can’t work without it, auditors say nobody should have it assigned.<br />
This course will teach you the most important SAP security features<br />
and will allow you to understand their implications. It will enable you to<br />
tailor the security settings and procedures to best fit your organization<br />
without losing sight of best practises.<br />
Target audience<br />
<strong>Security</strong> managers, SAP application managers, SAP security<br />
professionals and IT auditors regularly dealing with SAP related<br />
security challenges and such.<br />
Other stakeholders such as internal control managers, risk managers<br />
and IT professionals with an interest to learn more about SAP <strong>Security</strong><br />
concepts and techniques will benefit from this course as well.<br />
<strong>Course</strong> date and location<br />
This course is split into two parts. The first part is held on 30 – 31<br />
January 2014 and provides an introduction to the SAP security concept.<br />
The second part, held on 3 – 5 February 2014, provides additional<br />
details and advanced topics.<br />
The complete course will be held in Amsterdam.<br />
Costs<br />
The costs are EUR 1,795 ex VAT. Catering (lunch) and course<br />
materials are included in the price.<br />
Programme<br />
The SAP <strong>Security</strong> course will cover the most<br />
important security settings for an SAP ERP<br />
system. You will be introduced to SAP basis<br />
security features, their implications and<br />
constraints, where they are implemented, and<br />
how they can be audited. The course will also<br />
address topics such as ‘hacking’<br />
vulnerabilities, tooling and best practises.<br />
Although the course will focus on SAP ERP<br />
(commonly also referred to as R/3 and ECC),<br />
these concepts likewise apply to all other<br />
ABAP based systems, such as CRM, SRM<br />
and BI.<br />
The following topics will be addressed:<br />
• The SAP Landscape;<br />
• Access Path;<br />
• Introduction to <strong>Security</strong>;<br />
• Navigation;<br />
• User Management;<br />
• Authorization concept;<br />
• Profile Generator;<br />
• Logging;<br />
• System Parameters;<br />
• Transaction <strong>Security</strong>;<br />
• Program <strong>Security</strong>;<br />
• Table <strong>Security</strong>;<br />
• Job Scheduling;<br />
• Change Management;<br />
• Interfaces;<br />
• Use of tooling such as GRC.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 4
Prepare for Privacy: Are you prepared?<br />
The importance of protecting personal data within organisations has increased<br />
exponentially. Technological developments have facilitated organizations in processing<br />
more personal data and on a larger scale. This has triggered a rapidly growing public interest<br />
in the protection of personal data and related legislation and regulations.<br />
<strong>Course</strong> objectives<br />
This practical course will provide the participants with insight into the<br />
rules on processing personal data and the steps required for complying<br />
with privacy legislation.<br />
Target audience<br />
Data officers, HR managers, chief information officers, security<br />
managers and other persons who are responsible for protecting<br />
personal data or who work with personal data every day.<br />
The participants will not need a thorough knowledge of privacy<br />
legislation.<br />
<strong>Course</strong> date and location<br />
Programme<br />
The course will discuss the notification and<br />
information requirement, the requirements for<br />
international transfers and the security<br />
measures to be implemented. The cookie<br />
legislation, the rules on direct marketing,<br />
emails and internet monitoring and privacy<br />
aspects of “the Cloud will be dealt with too.<br />
Finally, the course goes into the various risks<br />
of processing personal data, unnecessary or<br />
otherwise, preventing data leakage, and the<br />
upcoming European Privacy Regulation.<br />
This one-day course will be held on 16 May 2014 in Amsterdam, the<br />
Netherlands.<br />
Costs<br />
The costs are EUR 695 ex VAT. Catering (lunch) and course materials<br />
are included in the price.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 5
HackLab: Hands-on Hacking<br />
Computer hacking is the practice of influencing computer hardware and software to<br />
accomplish a goal outside of their original purpose. A computer hacker is a person who<br />
identifies weaknesses and exploits them. Hacking is considered a complex activity. This<br />
course will explore the world of hacking and shed a light on how hackers work.<br />
<strong>Course</strong> objectives<br />
The practical five-day course equips participants with hands-on black<br />
box, white box and grey box vulnerability testing. We will address<br />
testing of web applications, mobile applications, mobile devices,<br />
wireless security, host based and network based infrastructure.<br />
The course takes the participants through the different stages of our<br />
proven methodology of information gathering, target selection and<br />
vulnerability identification and exploitation. Besides the methodology<br />
we will also discuss the different leading practises, such as OWASP<br />
and go into the different tools for vulnerability testing.<br />
Target audience<br />
<strong>Security</strong> managers, application developers, IT professionals and IT<br />
auditors who have an interest in ‘Vulnerability Assessment’ and<br />
‘Hacking’.<br />
Participants of the course are expected to have a basic understanding<br />
of network, TCP/IP and Operating Systems (Windows and Linux).<br />
<strong>Course</strong> date and location<br />
This five-day course will be held on 7 – 11 April and on 15 – 19<br />
September 2014 in Amsterdam, the Netherlands.<br />
Costs<br />
The costs are EUR 1,995 ex VAT. Catering (lunch) and course<br />
materials are included in the price.<br />
Programme<br />
Day 1: Introduction and external<br />
penetration tests<br />
• Introduction and security trends<br />
• Penetration testing methodology<br />
• External Infrastructure penetration test<br />
• Firewall security / Prevention systems<br />
• Physical security assessments and social<br />
engineering<br />
Day 2: Internal penetration tests<br />
• Infrastructure security test<br />
• Host-based security test<br />
• Wireless security test<br />
• Network security test<br />
Day 3: Application Assessments<br />
• Architecture<br />
• Information Gathering<br />
• Vulnerability analysis<br />
• Code review<br />
• OWASP top 10<br />
• Executing of a web application<br />
vulnerability assessment<br />
Day 4: Current trends in hacking<br />
• Mobile Applications and security<br />
• Incident response / <strong>Security</strong> Operating<br />
Centres<br />
• Malware analysis<br />
• Hacking game<br />
• Reporting Exercise<br />
Day 5: Vulnerability assessment case<br />
• Summarizes all topics of the week<br />
• Interview the client<br />
• Vulnerability assessment execution<br />
• Reporting and presentation of the results<br />
• Evaluation and closing<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 6
HackLab: Malware Analysis<br />
Malware stands for malicious software, scripts or code meant to aid an attacker to hack a<br />
system, keep control, steal information or to cause damage. Analysing malware is a difficult<br />
task without the right knowledge and experience. During this course hands-on experience is<br />
gained with the analysis of malware, from the first<br />
steps to the analysing of advanced malware.<br />
<strong>Course</strong> objectives<br />
This hands-on course enables participants to make their first steps<br />
towards malware analysis up to the full reverse engineering of malware.<br />
We will deal with different methods of malware analysis, such as<br />
behavioural and static analysis. Topics addressed in this course include:<br />
the different properties and actions of malware, forensic traces, network<br />
traffic, obfuscation and encryption. Various malware files, specifically<br />
written for this course, will be analysed prior to analysing existing malware.<br />
A major element of this course is hands-on reverse engineering, giving<br />
maximum experience to participants during the three days.<br />
Following this course enables participants to perform their first analysis on<br />
encountered malware, correctly estimate the behaviour of malware, and<br />
understand how it can be countered.<br />
Target audience<br />
Incident response employees, digital forensic researchers, IT system &<br />
network administrators and IT professionals interested in malware<br />
analysis.<br />
The participants should have fundamental insight into network protocols,<br />
IP network services, and operating systems. Experience with malware is<br />
not required, but a solid technical background is desired.<br />
<strong>Course</strong> date and location<br />
This three-day course will be held on 15 – 17 April and on 9 – 11<br />
September 2014 in Amsterdam, the Netherlands.<br />
Costs<br />
The costs are EUR 1,295 ex VAT. Catering (lunch) and course materials<br />
are included in the price.<br />
Programme<br />
Day 1: Introduction<br />
• General malware overview<br />
• Malware history<br />
• How victims are infected<br />
• Botnets<br />
• Malware analysis introduction<br />
• Malware identification<br />
• Malware packers and unpacking<br />
• Behavioural analysis<br />
• Malware debugging<br />
Day 2: Analysis<br />
• Banking Malware<br />
• Static Analysis<br />
• Anti-Virus products<br />
• Malware recovery<br />
• Malware crypto<br />
• Malware tools<br />
• Malware scripts analysis<br />
• Malware network traffic analysis<br />
• Exploit analysis<br />
• Malware Anti-Forensics<br />
Day 3: Training and deepening<br />
On Day 3, the knowledge gained is further<br />
put into practice. In different assignments,<br />
including the analysis of advanced malware<br />
specimens and Capture The Flag (CTF)<br />
exercises, insight will be provided into the<br />
inner working of malware analysis and<br />
reverse engineering in practice.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 7
HackLab: Introduction to <strong>Cyber</strong>crime<br />
Over the last couple of years, cyber attacks have frequently made the headlines. Newspapers<br />
and online media are filled with terms such as trojans, botnets, phishing, denial of service<br />
attacks and data breaches. But what do these terms really mean and why are these attacks<br />
possible? This course will provide you with a theoretical and practical understanding of<br />
cyber attacks: essential if you wish to deal effectively with cybercrime within your<br />
organisation.<br />
<strong>Course</strong> objectives<br />
This course will explain the most common types of cyber attacks, the<br />
technology they are based on and the weaknesses they exploit in IT<br />
systems. To better understand cybercrime, we will look into the<br />
evolution of the Internet, the underlying technology and its global<br />
democratisation. We will also show how this insight into cybercrime<br />
can be used to design and implement effective risk mitigation<br />
measures, advise on security or prosecute cyber fraudsters.<br />
This course is a good foundation for any professional wanting to<br />
pursue training or further their knowledge of this field. It is not a deep<br />
dive into hacking activities or malware analysis. For more information<br />
on these topics please refer to HackLab: Hands-on Hacking and<br />
HackLab: Malware Analysis.<br />
Target audience<br />
This course is targeted at members of law enforcement agencies,<br />
policy makers, security officers, security managers, IT managers,<br />
application developers, IT professionals and IT auditors who have an<br />
interest in the latest developments in cybercrime.<br />
<strong>Course</strong> date and location<br />
This three-day course will be held on 10−12 February and on 24−26<br />
September 2014 in Amsterdam, the Netherlands.<br />
Costs<br />
The costs are EUR 1,295 ex VAT. Catering (lunch) and course<br />
materials are included in the price.<br />
Programme<br />
Day 1: The Internet, protocols, phishing<br />
• The birth of the Internet<br />
• The Internet protocols: IP and TCP<br />
• The basis of HTTP and HTML<br />
• Proxies and firewalls<br />
• The mail protocol SMTP<br />
• Routers<br />
• The Domain Name System (DNS)<br />
• Phishing<br />
• Countermeasures phishing<br />
Day 2: DDOS, web applications and<br />
malware<br />
• Denial of Service attacks<br />
• Operating systems<br />
• (Web) servers and applications<br />
• HTTP<br />
• Browsers<br />
• Malware<br />
• Botnets<br />
• Banking trojans<br />
Day 3: Hacking and countermeasures<br />
• Hacking<br />
• Hacking phases<br />
• Vulnerabilities<br />
• Cases<br />
• SCADA/ICS<br />
• Countermeasures<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 8
HackLab: SAP<br />
Hacking and cybercrime currently receive a lot of media attention after recent incidents like<br />
Distributed Denial of Service (DDOS) attacks and theft of account and credit card data.<br />
Critical business applications like SAP have so far received little attention, even though they<br />
are the administrative heart of any business. This course shows a selection of vulnerabilities<br />
and how you can defend yourself against them.<br />
<strong>Course</strong> objectives<br />
This one-day course provides insight into the vulnerabilities of a SAP<br />
application and the associated infrastructure. After a brief introduction<br />
on SAP security and penetration testing in general, we will discuss a<br />
selection of known SAP vulnerabilities, showing you how easy it can<br />
be to access critical functions and data. We will also discuss how you<br />
can detect these vulnerabilities and properly secure your system<br />
against them.<br />
Target audience<br />
(SAP) <strong>Security</strong> professionals, IT managers, risk managers and IT<br />
professionals having an interest in SAP security and ethical hacking.<br />
<strong>Course</strong> date and location<br />
This one-day course will take place on 13 February 2014 in<br />
Amsterdam.<br />
Costs<br />
The costs of this course will be EUR 395 ex VAT. Catering (lunch) and<br />
course materials are included in the price.<br />
Programme<br />
Introduction<br />
• Introduction<br />
• Penetration test methodology<br />
• <strong>Overview</strong> SAP components<br />
Risks<br />
• What can go wrong<br />
• Risks in a SAP landscape<br />
Vulnerabilities<br />
• Sample vulnerabilities for the different<br />
SAP components<br />
• Possible countermeasures<br />
An average SAP landscape comprises a<br />
large number of technical components. It is<br />
impossible to discuss all possible<br />
vulnerabilities for all these components in a<br />
single day. Hence we have selected a<br />
number of relevant vulnerabilities, applicable<br />
for different components. This enables us to<br />
clearly outline the security possibilities in a<br />
SAP landscape.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 9
ISO 27001 Implementation and Audit<br />
Gaining and delivering information is critical to achieving your business goals and building<br />
a sustainable business. Securing information within organizations is therefore becoming<br />
more important. The ISO 27001 standard is designed to help your organization manage and<br />
secure critical business information in the context of overall business risk and signals your<br />
clients that you are actively working towards a more secure organization.<br />
<strong>Course</strong> objectives<br />
This three-day course offers practical guidance on how ISO 27001<br />
certification can be achieved and what the biggest challenges are<br />
during an audit. It explains the required Plan, Do, Check & Act cycle<br />
and the role of the Information <strong>Security</strong> Management System (ISMS).<br />
The course offers insight on how controls are selected in order to cover<br />
business risks and explains the relationship between ISO 27001 and<br />
other ISO standards.<br />
Areas of interest include risk analysis, business risk, creating<br />
improvement plans and integrating information security into your<br />
business. Special attention is given to incident management, business<br />
continuity, data classification and access control.<br />
Participants will benefit from our experience as both implementers and<br />
auditors through real-life cases and examples.<br />
All topics will be handled from both an implementer and auditor point of<br />
view.<br />
Target audience<br />
Information security managers, internal IT auditors, business<br />
managers with information security in their portfolio, IT security<br />
professionals and security officers.<br />
Programme<br />
Day 1<br />
• Introduction to ISO 27001 standard<br />
• Structure of ISO 27001 standard and<br />
relationship to other ISO standards<br />
• Differences between 2005 and 2013<br />
version<br />
• Information <strong>Security</strong> Management<br />
System and role of the Plan, Do Check &<br />
Act cycle<br />
Day 2<br />
• Risk analysis and improvement plans<br />
• <strong>Security</strong> policies and ISO 27001<br />
• Project planning<br />
Day 3<br />
• ISO 27001 controls<br />
• Audit and review, including improvement<br />
cycle<br />
• Steps towards certification of the<br />
organization<br />
<strong>Course</strong> date and location<br />
This three-day course will be held on17−19 February 2014 in<br />
Amsterdam, the Netherlands.<br />
Costs<br />
The costs are EUR 750 ex VAT. Catering (lunch) and course materials<br />
are included in the price.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 10
SCADA <strong>Security</strong><br />
The past years, off-the-shelve software and hardware as well as remote access possibilities<br />
in industrial environments have increased. The broader threat landscape and increased<br />
sophistication of attacks indicate the need to improve SCADA (supervisory control and data<br />
acquisition) security capabilities. But where to begin? During this course we will provide<br />
insight in threats, best practices, vulnerabilities and mitigating controls. We will take the<br />
participant through the complete SCADA security cycle: Know, Prevent, Detect, Respond<br />
and Recover.<br />
<strong>Course</strong> objectives<br />
This intensive, three-day course that covers various topics to improve<br />
understanding of the SCADA environment and security of SCADA<br />
systems.<br />
The course provides the fundamentals on SCADA security. The<br />
participants will be able to make informed decisions regarding the<br />
security of controls systems and understand the implications of these<br />
decisions.<br />
The course delivers knowledge about the differences between<br />
industrial and business IT, including the difficulties of implementing<br />
common security practices on SCADA systems. From a compliance<br />
perspective several standards provide helpful insights to improve the<br />
security capabilities. For this purpose the course will elaborate on<br />
standards and best practices such as: ISO-27000, NERC-CIP, SANS<br />
and ISA-99. On a practical level, the course will provide a hands-on<br />
workshop in which participants can experience SCADA exploitation. In<br />
addition, the program elaborates on SCADA vulnerability and security<br />
assessments.<br />
Target audience<br />
IT professionals, penetration testers and managers that want to<br />
increase their understanding and knowledge of the SCADA<br />
environment and SCADA security assessments.<br />
Programme<br />
Day 1: Know<br />
• Understanding the SCADA threat<br />
landscape<br />
• Understanding the differences between<br />
industrial- and business IT security<br />
• Understanding best practices and<br />
standards<br />
Day 2: Prevent & Detect<br />
• Reviewing SCADA architecture<br />
• Reviewing SCADA vulnerabilities<br />
• <strong>Security</strong> logging and monitoring<br />
• Selecting and implementing security<br />
controls<br />
Day 3: Respond & Recover<br />
• Hands-on SCADA exploitation workshop<br />
• Active and passive security assessments<br />
• Implementing a security operations centre<br />
and disaster recovery strategies<br />
• Future SCADA security technologies<br />
<strong>Course</strong> date and location<br />
This three-day course will be held on 17 – 19 March 2014 in<br />
Amsterdam, the Netherlands.<br />
Costs<br />
The costs are EUR 1,295 ex VAT. Catering (lunch) and course<br />
materials are included in the price.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 11
Oracle GRC<br />
This two day course enables you to smoothen your Oracle Governance, Risk & Compliance<br />
(GRC) implementation journey. It brings insight in how Oracle’s GRC software can help in<br />
managing risks and controls (access, process and business controls) from a single repository.<br />
The course aims to get you comfortable with a best practise implementation strategy and<br />
approach, lessons learned and key success factors. For those looking for hands-on<br />
experience and practical use cases the course offers a technical Deep Dive.<br />
<strong>Course</strong> objectives<br />
In today’s unpredictable and highly competitive business environment,<br />
it’s important to take a holistic view of governance, risk and compliance<br />
(GRC) — while focusing not only on the risks that can threaten value,<br />
but also the risks that an enterprise can take to create value. People,<br />
processes and technology should all work together to help the<br />
enterprise stay in control of the risks it chooses to take.<br />
Oracle’s comprehensive GRC software provides the functionalities to<br />
automate your GRC initiatives and processes to optimize business<br />
processes, manage risks and comply with regulations.<br />
This course will teach you how Oracle’s GRC software can help in<br />
managing risks and controls (access, process and business controls)<br />
from a single repository. Additionally, the course covers<br />
implementation strategy, lessons learned, key success factors and<br />
best practices to make you more comfortable with your GRC<br />
implementation. We will also take a deep-dive into the system to<br />
understand the technical basics, based on a case study.<br />
Target audience<br />
Risk managers, financial and business controllers, Oracle competence<br />
centre managers, functional consultants, implementation consultants,<br />
security & GRC consultants, program managers and IT governance<br />
experts.<br />
<strong>Course</strong> date and location<br />
This two-day course will be held on 13 − 14 March 2014 in Amsterdam,<br />
the Netherlands.<br />
Costs<br />
The costs are EUR 795 ex VAT. Catering (lunch) and course materials<br />
are included in the price.<br />
Programme<br />
This two day course contains both functional<br />
and high-level technical aspects of Oracle<br />
GRC and will help audience with both<br />
technical and non-technical background.<br />
Day 1<br />
The first day will mainly focus on functional<br />
side of Oracle GRC and covers:<br />
• Holistic view on GRC<br />
• Product overview of Oracle GRC<br />
• New features and key enhancement<br />
• Implementation strategy and approach<br />
• Lessons learned<br />
• Key success factors<br />
• Best practices.<br />
Day 2<br />
The second day is designed to give you a<br />
more comprehensive understanding of the<br />
technical implementation of GRC and focuses<br />
on:<br />
• Installation requirements<br />
• Technical configuration basics of Oracle<br />
GRC based on use cases and exercises,<br />
e.g:<br />
− TCG – Transaction Controls Governor<br />
− AACG – Application Access Controls<br />
Governor<br />
− CCG – Configuration Controls<br />
Governor<br />
− PCG – Preventive Controls Governor<br />
Although this program is specifically designed<br />
for Oracle GRC Controls, it will touch upon<br />
the integration point with Oracle GRC<br />
Manager and Oracle GRC Intelligence.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 12
SAP GRC<br />
This course enables you to release the value of Governance, Risk & Compliance (GRC)<br />
within your organization through automation with SAP GRC. It brings insight in how SAP’s<br />
GRC software can help in managing risks and controls (access, process and business<br />
controls) from a single repository. The course aims to get you comfortable with a best<br />
practise implementation strategy and approach, lessons learned and key success factors. For<br />
those looking for hands-on experience and practical use cases the course offers a technical<br />
Deep Dive.<br />
<strong>Course</strong> objectives<br />
In today’s unpredictable and highly competitive business environment,<br />
it’s important to take a holistic view of governance, risk and compliance<br />
(GRC) — while focusing not only on the risks that can threaten value,<br />
but also the risks that an enterprise can take to create value. People,<br />
processes and technology should all work together to help the<br />
enterprise stay in control of the risks it chooses to take.<br />
SAP’s comprehensive GRC software provides the functionalities to<br />
automate your GRC initiatives and processes to optimize business<br />
processes, manage risks and comply with regulations.<br />
This course will teach you how SAP’s GRC software can help in<br />
managing risks and controls (access, process and business controls)<br />
from a single repository. Additionally, the course covers<br />
implementation strategy, lessons learned, key success factors and<br />
best practices to make you more comfortable with your GRC<br />
implementation. We will also take a deep-dive into the system to<br />
understand the technical basics, based on a case study.<br />
Target audience<br />
Risk managers, financial and business controllers, SAP competence<br />
centre managers, functional consultants, implementation consultants,<br />
security & GRC consultants, program managers and IT governance<br />
experts.<br />
<strong>Course</strong> date and location<br />
This five-day course will be held on 24 − 28 March 2014 in Amsterdam,<br />
the Netherlands.<br />
Costs<br />
The costs are EUR 1,795 ex VAT. Catering (lunch) and course<br />
materials (hand-outs and exercises) are included in the price.<br />
The costs for participants who only want to participate in Part 1: SAP<br />
GRC Essentials (2 Days) are 795 ex VAT.<br />
Programme<br />
This course is divided into two parts which<br />
enables participants to register, based on<br />
their experience and learning goals<br />
Part 1: SAP GRC Essentials (2 Days)<br />
The first two days mainly focus on functional<br />
side of SAP GRC and covers:<br />
• Holistic view on GRC<br />
• Product overview of SAP GRC<br />
• New features and key enhancement<br />
• Implementation strategy and approach<br />
• Lessons learned<br />
• Key success factors<br />
• Best practices.<br />
Part 2: SAP GRC Deep Dive (3 Days)<br />
The following 3 days are designed to give you<br />
a more comprehensive understanding of the<br />
technical implementation of GRC and focuses<br />
on:<br />
• Installation requirements<br />
• Technical configuration basics of SAP<br />
GRC Access Control based on use cases<br />
and exercises, e.g.:<br />
− Access Risk Analysis<br />
− Access Request Provisioning<br />
− Business Role Management<br />
− Emergency Access Management<br />
− MSMP Based Workflow design for<br />
workflow<br />
− BRF+ based rule creation<br />
• Technical configuration basics of SAP<br />
GRC Process Control and Risk<br />
Management based on use cases and<br />
exercises.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 13
In-house training, custom training and<br />
learning programmes<br />
<strong>Deloitte</strong> offers more than just the trainings referred to before. We provide in-house trainings<br />
too: anything from standard trainings to trainings tailored to your organization. We can even<br />
set up a full learning programme uniquely geared to your organization.<br />
In-house training<br />
In-house or in-company training distinguishes itself because it<br />
specifically focuses on your organization. The training can thus be<br />
adapted to your wishes.<br />
Standard training<br />
Apart from our offerings discussed in this flyer, we have a great choice<br />
of standard trainings available. We can consult with you to include<br />
specific priority aspects you consider to be important.<br />
Custom training<br />
A careful analysis of your learning needs and an extensive intake will<br />
enable us to prepare a custom training. This will allow you to train and<br />
educate your professionals very effectively. Since the course materials<br />
and examples will be geared to your own organization, your<br />
professionals will be able to immediately use what they have learned in<br />
their daily practice.<br />
Learning programme<br />
In addition to offering in-house trainings, we also offer you the option to<br />
prepare a full, tailored learning programme, entirely geared to your<br />
organization, the business objectives, and the employees’ learning<br />
needs.<br />
Costs<br />
Feel free to contact us for more information on pricing or to get a quote.<br />
Even a relatively low number of participants can make an in-house<br />
training more economical than a regular external training.<br />
Further information<br />
If the training you need is not stated here, or if you want further<br />
information on our training and learning offering, please contact us.<br />
Contact details can be found in the back of this brochure.<br />
Topics<br />
<strong>Deloitte</strong> provides a great deal of trainings all<br />
across the world, so we have a large number<br />
of standard trainings and topics readily<br />
available. These are just some of the<br />
trainings we have on offer:<br />
• <strong>Security</strong> & Risk Management<br />
(Governance, Frameworks, Architecture,<br />
Transformation)<br />
• Business Continuity & Disaster Recovery<br />
• Identity & Access Management<br />
• <strong>Security</strong> Architecture<br />
• <strong>Cyber</strong> <strong>Security</strong><br />
• Infrastructure Protection<br />
• Application Protection<br />
• Secure Software Development<br />
• End User security (Awareness, Social<br />
media, Mobile devices)<br />
• Vendor control (Cloud computing,<br />
Assurance)<br />
• Privacy<br />
• Hacking and Vulnerability Assessments<br />
Specific systems & certifications<br />
In addition, we offer security trainings on<br />
specific systems, such as SAP and Oracle.<br />
We can arrange trainings for most of the<br />
security certifications (CISSP, CISM, CISA,<br />
CEH, etc.) as well.<br />
Training forms<br />
We are able to provide various training forms<br />
such as: classroom based, e-learnings,<br />
webinars, workshops and game-based.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 14
Your facilitators<br />
Our professionals are your facilitators − sharing with you their practical knowledge. Our course offerings distinguish<br />
themselves by being topical and effective. The limited number of participants per course offers plenty of space for<br />
interaction between facilitator and participants in a stimulating and pleasant atmosphere. The following professionals<br />
facilitate the courses mentioned in this brochure:<br />
Marko van Zwam<br />
Partner <strong>Deloitte</strong> <strong>Security</strong> & Privacy<br />
Marko is a partner within <strong>Deloitte</strong> Risk Services and leads the <strong>Security</strong> & Privacy team, which consists of more than<br />
100 professionals. He has over 18 years of experience in IT, IT <strong>Security</strong>, IT Audit and IT Risk Management.<br />
Gijs Hollestelle<br />
Facilitator CISSP Certification<br />
Gijs is a senior manager in the <strong>Security</strong> & Privacy team. Gijs has over 8 years of experience in security issues,<br />
from security awareness to IT infrastructure security and Ethical Hacking. Gijs was part of the winning team at the<br />
Global <strong>Cyber</strong>Lympics 2013.<br />
Coen Steenbeek<br />
Facilitator HackLab – Hands-on Hacking<br />
Coen is a manager in the <strong>Security</strong> & Privacy team. Coen specializes in both technical engagements like<br />
vulnerability assessments and in performing security management related tasks (ISO27001 / 2). During his career<br />
at <strong>Deloitte</strong> Coen has earned the RE, CEH, CISSP, CISM and CGEIT certifications and he was part of the winning<br />
team at the Global <strong>Cyber</strong>Lympics 2013.<br />
Trajce Dimkov<br />
Facilitator SCADA <strong>Security</strong><br />
Trajce is a manager within the <strong>Security</strong> & Privacy team and has over 7 years of experience in ICT infrastructure<br />
and security. Trajce specializes in both security management of industrial control systems and vulnerability<br />
assessment. Previous to his work at <strong>Deloitte</strong>, Trajce did a PhD at the University of Twente on social engineering<br />
and physical penetration testing and is currently involved in many vulnerability assessments that include these two<br />
ingredients.<br />
Frank Hakkennes<br />
Facilitator SAP <strong>Security</strong> & HackLab: SAP<br />
Frank is a manager in the <strong>Deloitte</strong> <strong>Security</strong> & Privacy Risk Services team. Frank specializes in security<br />
management, particularly for SAP environments. Frank is a certified SAP <strong>Security</strong> Consultant and has been<br />
responsible for audit, implementation and advisory services in respect of (SAP) security and configuration<br />
management.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 15
Tom-Martijn Roelofs<br />
Facilitator HackLab – Introduction <strong>Cyber</strong>crime<br />
Tom-Martijn is Director <strong>Cyber</strong> <strong>Security</strong> in the <strong>Security</strong> & Privacy team. Tom-Martijn has extensive experience in<br />
combating cybercrime, IT management and audit. As a former head of ABN AMRO’s cybercrime response team,<br />
Tom-Martijn has gained extensive expertise in incident response, fraud detection, network security monitoring and<br />
crisis. He has set up a training program for combating financial cybercrime.<br />
Henk Marsman<br />
Facilitator CISM Certification<br />
Henk is a senior manager in the <strong>Security</strong> & Privacy team and has over 13 years of experience in IT <strong>Security</strong> and<br />
risk management. Henk focusses on security management and identity & access management. He also has a<br />
background in public key infrastructure and network security. Currently Henk co-leads the <strong>Security</strong> management<br />
practice within the <strong>Security</strong> & Privacy team.<br />
Martijn Knuiman<br />
Facilitator HackLab – Hands-on Hacking<br />
Martijn is a senior manager in the <strong>Security</strong> & Privacy team. Martijn has over 10 years of experience in ICT<br />
infrastructure and security. Martijn has extensive experience in Network Operating Systems, IT forensics, Data<br />
Leakage Prevention, <strong>Security</strong> Governance, <strong>Security</strong> Management and Ethical Hacking.<br />
Annika Sponselee<br />
Facilitator Prepare for Privacy<br />
Annika is a senior manager within the <strong>Security</strong> & Privacy team. Annika has over 8 years of experience in privacy<br />
law and data protection law. Before Annika started working at <strong>Deloitte</strong>, she was a lawyer at Baker & McKenzie,<br />
also in privacy law. Her daily activities include advisory and support services for large companies and<br />
multinationals on national and international privacy law issues. Annika regularly gives trainings and presentations<br />
on privacy legislation.<br />
Thijs Bosschert<br />
Facilitator HackLab – Malware Analysis<br />
Thijs is a manager in the <strong>Security</strong> & Privacy team. Thijs has over 8 years of experience in Incident Response and<br />
Forensics and over 11 years of experience in IT security. Thijs has experience in conducting and managing<br />
incident responses and forensics investigations, pen-testing and malware research. Thijs was part of the <strong>Deloitte</strong><br />
Global <strong>Cyber</strong>Lympics team that won at the Global <strong>Cyber</strong>Lympics 2013.<br />
Ruud Schellekens<br />
Facilitator CISSP Certification<br />
Ruud is a manager in the <strong>Security</strong> & Privacy team. With a strong IT background, Ruud started as an IT auditor. In<br />
this role he obtained a broad knowledge of the security of ERP applications and IT infrastructures. In addition,<br />
Ruud has been involved in developing various <strong>Deloitte</strong> security auditing tools. Ruud is a certified CISM, EDP<br />
auditor, CISSP and GRAPA professional.<br />
Floris Schoenmakers<br />
Facilitator SCADA <strong>Security</strong><br />
Floris is a senior consultant within the <strong>Security</strong> & Privacy team. Floris has done research into the increasing<br />
integration of industrial and business IT in SCADA environments and the vulnerabilities associated with this<br />
integration. Floris is certified CISSP and CSSA. His main focus is the security of industrial systems and<br />
infrastructure.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 16
Suzanne Janse<br />
Facilitator SAP GRC<br />
Suzanne is working as director in the <strong>Security</strong> & Privacy team of <strong>Deloitte</strong> Risk Services. She heads the ERP Risk<br />
Consulting and GRC (Governance, Risk & Compliance) software practice; a team of highly motivated subject<br />
matter experts in the field of ERP (SAP, Oracle) <strong>Security</strong> & Controls and GRC software implementation.<br />
Ashees Mishra<br />
Facilitator SAP GRC<br />
Asheesh works as a manager in the <strong>Security</strong> & Privacy section of <strong>Deloitte</strong> Risk Services. He has more than 9 years<br />
of work experience in area of SAP GRC Access control, Process Control, Risk Management, SAP <strong>Security</strong> and Net<br />
weaver IDM. He has lead and been part of several SAP GRC (AC/PC) rollout projects, Controls and SOX<br />
engagements, SAP <strong>Security</strong> and authorization design.<br />
Willem van der Valk<br />
Facilitator Oracle GRC<br />
Willem is an experienced senior manager within the <strong>Security</strong> & Privacy team of <strong>Deloitte</strong> Risk Services. He has a<br />
background in Oracle eBS and has a broad knowledge of Governance, Risk & Compliance (GRC). Willem has<br />
been involved in many Oracle ERP and GRC implementations. Furthermore he regularly performs Oracle <strong>Security</strong><br />
and Controls assessments at different type of clients.<br />
Berry Kok<br />
Facilitator Oracle GRC<br />
Berry is an experienced junior manager within the <strong>Deloitte</strong> Risk Services department and has a focus on GRC,<br />
<strong>Security</strong> and Controls, User Access Management and Segregation of Duties within Oracle applications. Berry<br />
developed his Oracle expertise by following multiple courses at the Oracle University (i.e. GL, AP, AR,<br />
Procurement, GRC) and performing several Oracle security related assignments, ranging from ERP and GRC<br />
implementations, SOD reviews and <strong>Security</strong> & Controls audits.<br />
Marlous Theunissen<br />
Facilitator HackLab – Malware Analysis<br />
Marlous is a consultant in the <strong>Security</strong> and Privacy team of <strong>Deloitte</strong> Risk Services. Marlous graduated cum laude in<br />
Computer Science and Engineering with focus on both security and algorithms. She has gained experience in<br />
penetrations tests and malware analysis, and passed both the CISM and CISSP examinations this year.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 17
Additional course information<br />
Number of participants<br />
Depending on the nature of the course and the level of<br />
interaction we have a maximum number of participants<br />
per course.<br />
<strong>Course</strong> hours<br />
9:00 to 17:30 hours, including lunch.<br />
Location<br />
Our courses are being facilitated at our office in<br />
Amsterdam. Approximately one month before the<br />
course date you will receive more information about the<br />
exact location of the course.<br />
Language<br />
The courses will be given in English or Dutch,<br />
depending on the participants’ preferred language. The<br />
course material is in English.<br />
Permanent Education<br />
<strong>Deloitte</strong> Academy is a NBA (The Netherlands Institute<br />
of Chartered Accountants) acknowledged institution.<br />
These courses will earn you PE points.<br />
Registration<br />
You can register for this course through<br />
www.deloitte.nl/academy.<br />
More information<br />
For more information about these courses contact:<br />
<strong>Deloitte</strong> Academy<br />
Postbus 2031<br />
3000 CA Rotterdam<br />
Phone: 088 − 288 9333<br />
Fax: 088 − 288 9844<br />
E-mail: nlacademy@deloitte.nl<br />
Internet: www.deloitte.nl/academy<br />
Cancellation policy<br />
Please refer to our website for our Terms and<br />
Conditions and cancellation policy.<br />
<strong>Deloitte</strong> Academy reserves the right to cancel the<br />
course in the event of insufficient registrations. You will<br />
be informed about this on time.<br />
<strong>Course</strong> overview − <strong>Security</strong> & Privacy 18
Contact us<br />
<strong>Deloitte</strong> Academy<br />
Wilhelminakade 1<br />
3072 AP Rotterdam<br />
Postbus 2031<br />
3000 CA Rotterdam<br />
Phone 088 288 9333<br />
Fax 088 288 9844<br />
nlacademy@deloitte.nl<br />
www.deloitte.nl/academy<br />
<strong>Deloitte</strong> refers to one or more of <strong>Deloitte</strong> Touche Tohmatsu Limited, a UK private company limited by guarantee, and its<br />
network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.nl/about for a<br />
detailed description of the legal structure of <strong>Deloitte</strong> Touche Tohmatsu Limited and its member firms.<br />
<strong>Deloitte</strong> provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.<br />
With a globally connected network of member firms in more than 150 countries, <strong>Deloitte</strong> brings world-class capabilities and<br />
high-quality service to clients, delivering the insights they need to address their most complex business challenges. <strong>Deloitte</strong> has<br />
in the region of 200,000 professionals, all committed to becoming the standard of excellence.<br />
This communication is for internal distribution and use only among personnel of <strong>Deloitte</strong> Touche Tohmatsu Limited, its member<br />
firms, and their related entities (collectively, the “<strong>Deloitte</strong> Network”). None of the <strong>Deloitte</strong> Network shall be responsible for any<br />
loss whatsoever sustained by any person who relies on this communication.<br />
© 2014 <strong>Deloitte</strong> The Netherlands