17.01.2014 Views

Course Overview Cyber Security - Deloitte

Course Overview Cyber Security - Deloitte

Course Overview Cyber Security - Deloitte

SHOW MORE
SHOW LESS

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

<strong>Course</strong> <strong>Overview</strong><br />

<strong>Cyber</strong> <strong>Security</strong><br />

Sharpen your mind.<br />

<strong>Deloitte</strong> Academy<br />

2014


We believe it is important to share our knowledge with clients and business relations.<br />

For this reason, we want to offer you the opportunity to participate in a training<br />

course together with our <strong>Deloitte</strong> <strong>Security</strong> & Privacy professionals.<br />

This overview contains the following training courses:<br />

• CISSP Certification<br />

• CISM Certification<br />

• SAP <strong>Security</strong><br />

• Prepare for Privacy<br />

• HackLab: Hands-on Hacking<br />

• HackLab: Malware Analysis<br />

• HackLab: Introduction to <strong>Cyber</strong>crime<br />

• HackLab: SAP<br />

• ISO 27001 Implementation and Audit<br />

• SCADA <strong>Security</strong><br />

• Oracle GRC<br />

• SAP GRC<br />

• In-house training, custom training and learning programmes<br />

<strong>Cyber</strong>Lympics 2011, 2012 and 2013.<br />

<strong>Deloitte</strong> has extensive experience in the field of advising and assessing the information security within governments<br />

and business. Our team consists of more than 30 specialists that describe "ethical hacking" as their great passion.<br />

The knowledge, experience and passion are reaffirmed in the recent finals of the Global <strong>Cyber</strong>Lympics. The team of<br />

<strong>Deloitte</strong> Netherlands did win, for the third time in a row a contest which consisted of both offensive and defensive<br />

security challenges.


CISSP Certification<br />

The Certified Information Systems <strong>Security</strong> Professional (CISSP) certification is a globally<br />

recognized credential: the first of its kind and accredited by the American National<br />

Standards Institute (ANSI).<br />

<strong>Course</strong> objectives<br />

The <strong>Deloitte</strong> (ISC)2 CISSP Certification course is an intensive, five-day<br />

course that covers the most comprehensive compendium of<br />

information security best practices – the Common Body of Knowledge<br />

(CBK). The CISSP CBK establishes a common framework of<br />

information security terms and principles that allow information security<br />

professionals worldwide to discuss, debate and resolve matters<br />

pertaining to the profession, with a common understanding.<br />

The CISSP CBK consists of the following 10 domains:<br />

1. Access Control;<br />

2. Application <strong>Security</strong>;<br />

3. Business Continuity and Disaster Recovery Planning;<br />

4. Cryptography;<br />

5. Information <strong>Security</strong> and Risk Management;<br />

6. Legal, Regulations, Compliance and Investigations;<br />

7. Operations <strong>Security</strong>;<br />

8. Physical (Environmental) <strong>Security</strong>;<br />

9. <strong>Security</strong> Architecture and Design;<br />

10. Telecommunications and Network <strong>Security</strong><br />

The <strong>Deloitte</strong> CISSP certification course has a passing rate of over 90%<br />

as opposed to the average CISSP success rate of around 60%.<br />

Target audience<br />

Programme<br />

Day 1<br />

• Information <strong>Security</strong> Governance and<br />

Risk Management<br />

• <strong>Security</strong> Architecture and Design<br />

Day 2<br />

• Access Control<br />

• Application <strong>Security</strong><br />

• Operations <strong>Security</strong><br />

Day 3<br />

• Cryptography<br />

• Physical <strong>Security</strong><br />

Day 4<br />

• Networking<br />

• Business Continuity Planning<br />

Day 5<br />

• Business Continuity Planning<br />

• Legal and Regulatory<br />

• Sample exam (100 questions)<br />

Exam<br />

Participants will receive a voucher with which<br />

they can book an examination at a desired<br />

date and time at a Pearson VUE test centre<br />

of their choice.<br />

<strong>Security</strong> managers, risk managers, IT auditors, IT security<br />

professionals and security officers<br />

<strong>Course</strong> date and location<br />

This five-day course will be held on 3 – 7 March and on<br />

10 – 14 November 2014 in Amsterdam, the Netherlands.<br />

Costs<br />

The costs are EUR 2,995 ex VAT. Exam voucher, catering (lunch) and<br />

course materials are included in the price.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 2


CISM Certification<br />

CISM, Certified Information <strong>Security</strong> Manager, is a globally acknowledged information<br />

security management certification. This certification demonstrates you can connect<br />

information security to your organization’s business goals, understand the security aspects<br />

of new and current technologies, and possess the knowledge and skills to manage<br />

information security within your organization.<br />

<strong>Course</strong> objectives<br />

The <strong>Deloitte</strong> CISM certification course is a three-day course, which<br />

aims to prepare participants for successfully passing the CISM exam.<br />

The CISM certification indicates that participants understand a global<br />

framework of information security management concepts and<br />

principles. These can be applied to different situations, so information<br />

security is managed in the best way possible. Areas of interest include<br />

risk management, handling security incidents, compliance issues,<br />

managing information security programs and integrating information<br />

security into the business.<br />

The CISM framework clarifies the use of information security<br />

management in the organization, while it ensures its application is in<br />

sync with the organisation’s business goals. Information security<br />

management thus becomes more effective and efficient.<br />

The CISM course comprises four domains:<br />

1. Information security governance<br />

2. Information risk and compliance<br />

3. Information security program development and management<br />

4. Information security incident management<br />

Besides these four domains, exam preparation will be a significant part<br />

of the course.<br />

Programme<br />

Day 1<br />

• Introduction to CISM<br />

• Information security governance<br />

• Exercises<br />

Day 2<br />

• Information risk and compliance<br />

• Information security incident management<br />

• Exercises<br />

Day 3<br />

• Information security program<br />

development and management<br />

• Summary<br />

• Exam preparation<br />

Exam<br />

The exam can be taken on 14 June or 13<br />

December 2014. Participants have to<br />

register themselves at ISACA<br />

(www.isaca.org), up to 4 weeks prior to<br />

the exam.<br />

It is advisable to take the exam right after the<br />

training.<br />

Target audience<br />

(Information) <strong>Security</strong> managers (senior and junior level), business<br />

managers with information security in their portfolio, IT security<br />

professionals and security officers.<br />

<strong>Course</strong> date and location<br />

This three-day course will be held on 10 – 12 June and on 8 – 10<br />

December 2014 in Amsterdam, the Netherlands.<br />

Costs<br />

The costs are EUR 1,295 ex VAT. Catering (lunch) and course<br />

materials (CISM Review Manual and review questions) are included in<br />

the price. Exam fee is excluded.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 3


SAP <strong>Security</strong><br />

During this five-day course, we will facilitate an in-depth view of SAP security. Starting<br />

from the basic concepts, the most important SAP security options will be discussed. Since<br />

we believe in ‘doing is learning’, the course not only provides technical background: it<br />

includes plenty of opportunity to discuss practical use, benefits, constraints and real-life<br />

examples. More importantly, many hands-on exercises are included, challenging<br />

participants to put the theory into practise. <strong>Deloitte</strong> uses its own sandbox environments to<br />

this end.<br />

<strong>Course</strong> objectives<br />

If you have ever been involved with SAP and its security concept, you<br />

are most likely familiar with the term SAP_ALL. Developers say they<br />

can’t work without it, auditors say nobody should have it assigned.<br />

This course will teach you the most important SAP security features<br />

and will allow you to understand their implications. It will enable you to<br />

tailor the security settings and procedures to best fit your organization<br />

without losing sight of best practises.<br />

Target audience<br />

<strong>Security</strong> managers, SAP application managers, SAP security<br />

professionals and IT auditors regularly dealing with SAP related<br />

security challenges and such.<br />

Other stakeholders such as internal control managers, risk managers<br />

and IT professionals with an interest to learn more about SAP <strong>Security</strong><br />

concepts and techniques will benefit from this course as well.<br />

<strong>Course</strong> date and location<br />

This course is split into two parts. The first part is held on 30 – 31<br />

January 2014 and provides an introduction to the SAP security concept.<br />

The second part, held on 3 – 5 February 2014, provides additional<br />

details and advanced topics.<br />

The complete course will be held in Amsterdam.<br />

Costs<br />

The costs are EUR 1,795 ex VAT. Catering (lunch) and course<br />

materials are included in the price.<br />

Programme<br />

The SAP <strong>Security</strong> course will cover the most<br />

important security settings for an SAP ERP<br />

system. You will be introduced to SAP basis<br />

security features, their implications and<br />

constraints, where they are implemented, and<br />

how they can be audited. The course will also<br />

address topics such as ‘hacking’<br />

vulnerabilities, tooling and best practises.<br />

Although the course will focus on SAP ERP<br />

(commonly also referred to as R/3 and ECC),<br />

these concepts likewise apply to all other<br />

ABAP based systems, such as CRM, SRM<br />

and BI.<br />

The following topics will be addressed:<br />

• The SAP Landscape;<br />

• Access Path;<br />

• Introduction to <strong>Security</strong>;<br />

• Navigation;<br />

• User Management;<br />

• Authorization concept;<br />

• Profile Generator;<br />

• Logging;<br />

• System Parameters;<br />

• Transaction <strong>Security</strong>;<br />

• Program <strong>Security</strong>;<br />

• Table <strong>Security</strong>;<br />

• Job Scheduling;<br />

• Change Management;<br />

• Interfaces;<br />

• Use of tooling such as GRC.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 4


Prepare for Privacy: Are you prepared?<br />

The importance of protecting personal data within organisations has increased<br />

exponentially. Technological developments have facilitated organizations in processing<br />

more personal data and on a larger scale. This has triggered a rapidly growing public interest<br />

in the protection of personal data and related legislation and regulations.<br />

<strong>Course</strong> objectives<br />

This practical course will provide the participants with insight into the<br />

rules on processing personal data and the steps required for complying<br />

with privacy legislation.<br />

Target audience<br />

Data officers, HR managers, chief information officers, security<br />

managers and other persons who are responsible for protecting<br />

personal data or who work with personal data every day.<br />

The participants will not need a thorough knowledge of privacy<br />

legislation.<br />

<strong>Course</strong> date and location<br />

Programme<br />

The course will discuss the notification and<br />

information requirement, the requirements for<br />

international transfers and the security<br />

measures to be implemented. The cookie<br />

legislation, the rules on direct marketing,<br />

emails and internet monitoring and privacy<br />

aspects of “the Cloud will be dealt with too.<br />

Finally, the course goes into the various risks<br />

of processing personal data, unnecessary or<br />

otherwise, preventing data leakage, and the<br />

upcoming European Privacy Regulation.<br />

This one-day course will be held on 16 May 2014 in Amsterdam, the<br />

Netherlands.<br />

Costs<br />

The costs are EUR 695 ex VAT. Catering (lunch) and course materials<br />

are included in the price.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 5


HackLab: Hands-on Hacking<br />

Computer hacking is the practice of influencing computer hardware and software to<br />

accomplish a goal outside of their original purpose. A computer hacker is a person who<br />

identifies weaknesses and exploits them. Hacking is considered a complex activity. This<br />

course will explore the world of hacking and shed a light on how hackers work.<br />

<strong>Course</strong> objectives<br />

The practical five-day course equips participants with hands-on black<br />

box, white box and grey box vulnerability testing. We will address<br />

testing of web applications, mobile applications, mobile devices,<br />

wireless security, host based and network based infrastructure.<br />

The course takes the participants through the different stages of our<br />

proven methodology of information gathering, target selection and<br />

vulnerability identification and exploitation. Besides the methodology<br />

we will also discuss the different leading practises, such as OWASP<br />

and go into the different tools for vulnerability testing.<br />

Target audience<br />

<strong>Security</strong> managers, application developers, IT professionals and IT<br />

auditors who have an interest in ‘Vulnerability Assessment’ and<br />

‘Hacking’.<br />

Participants of the course are expected to have a basic understanding<br />

of network, TCP/IP and Operating Systems (Windows and Linux).<br />

<strong>Course</strong> date and location<br />

This five-day course will be held on 7 – 11 April and on 15 – 19<br />

September 2014 in Amsterdam, the Netherlands.<br />

Costs<br />

The costs are EUR 1,995 ex VAT. Catering (lunch) and course<br />

materials are included in the price.<br />

Programme<br />

Day 1: Introduction and external<br />

penetration tests<br />

• Introduction and security trends<br />

• Penetration testing methodology<br />

• External Infrastructure penetration test<br />

• Firewall security / Prevention systems<br />

• Physical security assessments and social<br />

engineering<br />

Day 2: Internal penetration tests<br />

• Infrastructure security test<br />

• Host-based security test<br />

• Wireless security test<br />

• Network security test<br />

Day 3: Application Assessments<br />

• Architecture<br />

• Information Gathering<br />

• Vulnerability analysis<br />

• Code review<br />

• OWASP top 10<br />

• Executing of a web application<br />

vulnerability assessment<br />

Day 4: Current trends in hacking<br />

• Mobile Applications and security<br />

• Incident response / <strong>Security</strong> Operating<br />

Centres<br />

• Malware analysis<br />

• Hacking game<br />

• Reporting Exercise<br />

Day 5: Vulnerability assessment case<br />

• Summarizes all topics of the week<br />

• Interview the client<br />

• Vulnerability assessment execution<br />

• Reporting and presentation of the results<br />

• Evaluation and closing<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 6


HackLab: Malware Analysis<br />

Malware stands for malicious software, scripts or code meant to aid an attacker to hack a<br />

system, keep control, steal information or to cause damage. Analysing malware is a difficult<br />

task without the right knowledge and experience. During this course hands-on experience is<br />

gained with the analysis of malware, from the first<br />

steps to the analysing of advanced malware.<br />

<strong>Course</strong> objectives<br />

This hands-on course enables participants to make their first steps<br />

towards malware analysis up to the full reverse engineering of malware.<br />

We will deal with different methods of malware analysis, such as<br />

behavioural and static analysis. Topics addressed in this course include:<br />

the different properties and actions of malware, forensic traces, network<br />

traffic, obfuscation and encryption. Various malware files, specifically<br />

written for this course, will be analysed prior to analysing existing malware.<br />

A major element of this course is hands-on reverse engineering, giving<br />

maximum experience to participants during the three days.<br />

Following this course enables participants to perform their first analysis on<br />

encountered malware, correctly estimate the behaviour of malware, and<br />

understand how it can be countered.<br />

Target audience<br />

Incident response employees, digital forensic researchers, IT system &<br />

network administrators and IT professionals interested in malware<br />

analysis.<br />

The participants should have fundamental insight into network protocols,<br />

IP network services, and operating systems. Experience with malware is<br />

not required, but a solid technical background is desired.<br />

<strong>Course</strong> date and location<br />

This three-day course will be held on 15 – 17 April and on 9 – 11<br />

September 2014 in Amsterdam, the Netherlands.<br />

Costs<br />

The costs are EUR 1,295 ex VAT. Catering (lunch) and course materials<br />

are included in the price.<br />

Programme<br />

Day 1: Introduction<br />

• General malware overview<br />

• Malware history<br />

• How victims are infected<br />

• Botnets<br />

• Malware analysis introduction<br />

• Malware identification<br />

• Malware packers and unpacking<br />

• Behavioural analysis<br />

• Malware debugging<br />

Day 2: Analysis<br />

• Banking Malware<br />

• Static Analysis<br />

• Anti-Virus products<br />

• Malware recovery<br />

• Malware crypto<br />

• Malware tools<br />

• Malware scripts analysis<br />

• Malware network traffic analysis<br />

• Exploit analysis<br />

• Malware Anti-Forensics<br />

Day 3: Training and deepening<br />

On Day 3, the knowledge gained is further<br />

put into practice. In different assignments,<br />

including the analysis of advanced malware<br />

specimens and Capture The Flag (CTF)<br />

exercises, insight will be provided into the<br />

inner working of malware analysis and<br />

reverse engineering in practice.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 7


HackLab: Introduction to <strong>Cyber</strong>crime<br />

Over the last couple of years, cyber attacks have frequently made the headlines. Newspapers<br />

and online media are filled with terms such as trojans, botnets, phishing, denial of service<br />

attacks and data breaches. But what do these terms really mean and why are these attacks<br />

possible? This course will provide you with a theoretical and practical understanding of<br />

cyber attacks: essential if you wish to deal effectively with cybercrime within your<br />

organisation.<br />

<strong>Course</strong> objectives<br />

This course will explain the most common types of cyber attacks, the<br />

technology they are based on and the weaknesses they exploit in IT<br />

systems. To better understand cybercrime, we will look into the<br />

evolution of the Internet, the underlying technology and its global<br />

democratisation. We will also show how this insight into cybercrime<br />

can be used to design and implement effective risk mitigation<br />

measures, advise on security or prosecute cyber fraudsters.<br />

This course is a good foundation for any professional wanting to<br />

pursue training or further their knowledge of this field. It is not a deep<br />

dive into hacking activities or malware analysis. For more information<br />

on these topics please refer to HackLab: Hands-on Hacking and<br />

HackLab: Malware Analysis.<br />

Target audience<br />

This course is targeted at members of law enforcement agencies,<br />

policy makers, security officers, security managers, IT managers,<br />

application developers, IT professionals and IT auditors who have an<br />

interest in the latest developments in cybercrime.<br />

<strong>Course</strong> date and location<br />

This three-day course will be held on 10−12 February and on 24−26<br />

September 2014 in Amsterdam, the Netherlands.<br />

Costs<br />

The costs are EUR 1,295 ex VAT. Catering (lunch) and course<br />

materials are included in the price.<br />

Programme<br />

Day 1: The Internet, protocols, phishing<br />

• The birth of the Internet<br />

• The Internet protocols: IP and TCP<br />

• The basis of HTTP and HTML<br />

• Proxies and firewalls<br />

• The mail protocol SMTP<br />

• Routers<br />

• The Domain Name System (DNS)<br />

• Phishing<br />

• Countermeasures phishing<br />

Day 2: DDOS, web applications and<br />

malware<br />

• Denial of Service attacks<br />

• Operating systems<br />

• (Web) servers and applications<br />

• HTTP<br />

• Browsers<br />

• Malware<br />

• Botnets<br />

• Banking trojans<br />

Day 3: Hacking and countermeasures<br />

• Hacking<br />

• Hacking phases<br />

• Vulnerabilities<br />

• Cases<br />

• SCADA/ICS<br />

• Countermeasures<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 8


HackLab: SAP<br />

Hacking and cybercrime currently receive a lot of media attention after recent incidents like<br />

Distributed Denial of Service (DDOS) attacks and theft of account and credit card data.<br />

Critical business applications like SAP have so far received little attention, even though they<br />

are the administrative heart of any business. This course shows a selection of vulnerabilities<br />

and how you can defend yourself against them.<br />

<strong>Course</strong> objectives<br />

This one-day course provides insight into the vulnerabilities of a SAP<br />

application and the associated infrastructure. After a brief introduction<br />

on SAP security and penetration testing in general, we will discuss a<br />

selection of known SAP vulnerabilities, showing you how easy it can<br />

be to access critical functions and data. We will also discuss how you<br />

can detect these vulnerabilities and properly secure your system<br />

against them.<br />

Target audience<br />

(SAP) <strong>Security</strong> professionals, IT managers, risk managers and IT<br />

professionals having an interest in SAP security and ethical hacking.<br />

<strong>Course</strong> date and location<br />

This one-day course will take place on 13 February 2014 in<br />

Amsterdam.<br />

Costs<br />

The costs of this course will be EUR 395 ex VAT. Catering (lunch) and<br />

course materials are included in the price.<br />

Programme<br />

Introduction<br />

• Introduction<br />

• Penetration test methodology<br />

• <strong>Overview</strong> SAP components<br />

Risks<br />

• What can go wrong<br />

• Risks in a SAP landscape<br />

Vulnerabilities<br />

• Sample vulnerabilities for the different<br />

SAP components<br />

• Possible countermeasures<br />

An average SAP landscape comprises a<br />

large number of technical components. It is<br />

impossible to discuss all possible<br />

vulnerabilities for all these components in a<br />

single day. Hence we have selected a<br />

number of relevant vulnerabilities, applicable<br />

for different components. This enables us to<br />

clearly outline the security possibilities in a<br />

SAP landscape.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 9


ISO 27001 Implementation and Audit<br />

Gaining and delivering information is critical to achieving your business goals and building<br />

a sustainable business. Securing information within organizations is therefore becoming<br />

more important. The ISO 27001 standard is designed to help your organization manage and<br />

secure critical business information in the context of overall business risk and signals your<br />

clients that you are actively working towards a more secure organization.<br />

<strong>Course</strong> objectives<br />

This three-day course offers practical guidance on how ISO 27001<br />

certification can be achieved and what the biggest challenges are<br />

during an audit. It explains the required Plan, Do, Check & Act cycle<br />

and the role of the Information <strong>Security</strong> Management System (ISMS).<br />

The course offers insight on how controls are selected in order to cover<br />

business risks and explains the relationship between ISO 27001 and<br />

other ISO standards.<br />

Areas of interest include risk analysis, business risk, creating<br />

improvement plans and integrating information security into your<br />

business. Special attention is given to incident management, business<br />

continuity, data classification and access control.<br />

Participants will benefit from our experience as both implementers and<br />

auditors through real-life cases and examples.<br />

All topics will be handled from both an implementer and auditor point of<br />

view.<br />

Target audience<br />

Information security managers, internal IT auditors, business<br />

managers with information security in their portfolio, IT security<br />

professionals and security officers.<br />

Programme<br />

Day 1<br />

• Introduction to ISO 27001 standard<br />

• Structure of ISO 27001 standard and<br />

relationship to other ISO standards<br />

• Differences between 2005 and 2013<br />

version<br />

• Information <strong>Security</strong> Management<br />

System and role of the Plan, Do Check &<br />

Act cycle<br />

Day 2<br />

• Risk analysis and improvement plans<br />

• <strong>Security</strong> policies and ISO 27001<br />

• Project planning<br />

Day 3<br />

• ISO 27001 controls<br />

• Audit and review, including improvement<br />

cycle<br />

• Steps towards certification of the<br />

organization<br />

<strong>Course</strong> date and location<br />

This three-day course will be held on17−19 February 2014 in<br />

Amsterdam, the Netherlands.<br />

Costs<br />

The costs are EUR 750 ex VAT. Catering (lunch) and course materials<br />

are included in the price.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 10


SCADA <strong>Security</strong><br />

The past years, off-the-shelve software and hardware as well as remote access possibilities<br />

in industrial environments have increased. The broader threat landscape and increased<br />

sophistication of attacks indicate the need to improve SCADA (supervisory control and data<br />

acquisition) security capabilities. But where to begin? During this course we will provide<br />

insight in threats, best practices, vulnerabilities and mitigating controls. We will take the<br />

participant through the complete SCADA security cycle: Know, Prevent, Detect, Respond<br />

and Recover.<br />

<strong>Course</strong> objectives<br />

This intensive, three-day course that covers various topics to improve<br />

understanding of the SCADA environment and security of SCADA<br />

systems.<br />

The course provides the fundamentals on SCADA security. The<br />

participants will be able to make informed decisions regarding the<br />

security of controls systems and understand the implications of these<br />

decisions.<br />

The course delivers knowledge about the differences between<br />

industrial and business IT, including the difficulties of implementing<br />

common security practices on SCADA systems. From a compliance<br />

perspective several standards provide helpful insights to improve the<br />

security capabilities. For this purpose the course will elaborate on<br />

standards and best practices such as: ISO-27000, NERC-CIP, SANS<br />

and ISA-99. On a practical level, the course will provide a hands-on<br />

workshop in which participants can experience SCADA exploitation. In<br />

addition, the program elaborates on SCADA vulnerability and security<br />

assessments.<br />

Target audience<br />

IT professionals, penetration testers and managers that want to<br />

increase their understanding and knowledge of the SCADA<br />

environment and SCADA security assessments.<br />

Programme<br />

Day 1: Know<br />

• Understanding the SCADA threat<br />

landscape<br />

• Understanding the differences between<br />

industrial- and business IT security<br />

• Understanding best practices and<br />

standards<br />

Day 2: Prevent & Detect<br />

• Reviewing SCADA architecture<br />

• Reviewing SCADA vulnerabilities<br />

• <strong>Security</strong> logging and monitoring<br />

• Selecting and implementing security<br />

controls<br />

Day 3: Respond & Recover<br />

• Hands-on SCADA exploitation workshop<br />

• Active and passive security assessments<br />

• Implementing a security operations centre<br />

and disaster recovery strategies<br />

• Future SCADA security technologies<br />

<strong>Course</strong> date and location<br />

This three-day course will be held on 17 – 19 March 2014 in<br />

Amsterdam, the Netherlands.<br />

Costs<br />

The costs are EUR 1,295 ex VAT. Catering (lunch) and course<br />

materials are included in the price.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 11


Oracle GRC<br />

This two day course enables you to smoothen your Oracle Governance, Risk & Compliance<br />

(GRC) implementation journey. It brings insight in how Oracle’s GRC software can help in<br />

managing risks and controls (access, process and business controls) from a single repository.<br />

The course aims to get you comfortable with a best practise implementation strategy and<br />

approach, lessons learned and key success factors. For those looking for hands-on<br />

experience and practical use cases the course offers a technical Deep Dive.<br />

<strong>Course</strong> objectives<br />

In today’s unpredictable and highly competitive business environment,<br />

it’s important to take a holistic view of governance, risk and compliance<br />

(GRC) — while focusing not only on the risks that can threaten value,<br />

but also the risks that an enterprise can take to create value. People,<br />

processes and technology should all work together to help the<br />

enterprise stay in control of the risks it chooses to take.<br />

Oracle’s comprehensive GRC software provides the functionalities to<br />

automate your GRC initiatives and processes to optimize business<br />

processes, manage risks and comply with regulations.<br />

This course will teach you how Oracle’s GRC software can help in<br />

managing risks and controls (access, process and business controls)<br />

from a single repository. Additionally, the course covers<br />

implementation strategy, lessons learned, key success factors and<br />

best practices to make you more comfortable with your GRC<br />

implementation. We will also take a deep-dive into the system to<br />

understand the technical basics, based on a case study.<br />

Target audience<br />

Risk managers, financial and business controllers, Oracle competence<br />

centre managers, functional consultants, implementation consultants,<br />

security & GRC consultants, program managers and IT governance<br />

experts.<br />

<strong>Course</strong> date and location<br />

This two-day course will be held on 13 − 14 March 2014 in Amsterdam,<br />

the Netherlands.<br />

Costs<br />

The costs are EUR 795 ex VAT. Catering (lunch) and course materials<br />

are included in the price.<br />

Programme<br />

This two day course contains both functional<br />

and high-level technical aspects of Oracle<br />

GRC and will help audience with both<br />

technical and non-technical background.<br />

Day 1<br />

The first day will mainly focus on functional<br />

side of Oracle GRC and covers:<br />

• Holistic view on GRC<br />

• Product overview of Oracle GRC<br />

• New features and key enhancement<br />

• Implementation strategy and approach<br />

• Lessons learned<br />

• Key success factors<br />

• Best practices.<br />

Day 2<br />

The second day is designed to give you a<br />

more comprehensive understanding of the<br />

technical implementation of GRC and focuses<br />

on:<br />

• Installation requirements<br />

• Technical configuration basics of Oracle<br />

GRC based on use cases and exercises,<br />

e.g:<br />

− TCG – Transaction Controls Governor<br />

− AACG – Application Access Controls<br />

Governor<br />

− CCG – Configuration Controls<br />

Governor<br />

− PCG – Preventive Controls Governor<br />

Although this program is specifically designed<br />

for Oracle GRC Controls, it will touch upon<br />

the integration point with Oracle GRC<br />

Manager and Oracle GRC Intelligence.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 12


SAP GRC<br />

This course enables you to release the value of Governance, Risk & Compliance (GRC)<br />

within your organization through automation with SAP GRC. It brings insight in how SAP’s<br />

GRC software can help in managing risks and controls (access, process and business<br />

controls) from a single repository. The course aims to get you comfortable with a best<br />

practise implementation strategy and approach, lessons learned and key success factors. For<br />

those looking for hands-on experience and practical use cases the course offers a technical<br />

Deep Dive.<br />

<strong>Course</strong> objectives<br />

In today’s unpredictable and highly competitive business environment,<br />

it’s important to take a holistic view of governance, risk and compliance<br />

(GRC) — while focusing not only on the risks that can threaten value,<br />

but also the risks that an enterprise can take to create value. People,<br />

processes and technology should all work together to help the<br />

enterprise stay in control of the risks it chooses to take.<br />

SAP’s comprehensive GRC software provides the functionalities to<br />

automate your GRC initiatives and processes to optimize business<br />

processes, manage risks and comply with regulations.<br />

This course will teach you how SAP’s GRC software can help in<br />

managing risks and controls (access, process and business controls)<br />

from a single repository. Additionally, the course covers<br />

implementation strategy, lessons learned, key success factors and<br />

best practices to make you more comfortable with your GRC<br />

implementation. We will also take a deep-dive into the system to<br />

understand the technical basics, based on a case study.<br />

Target audience<br />

Risk managers, financial and business controllers, SAP competence<br />

centre managers, functional consultants, implementation consultants,<br />

security & GRC consultants, program managers and IT governance<br />

experts.<br />

<strong>Course</strong> date and location<br />

This five-day course will be held on 24 − 28 March 2014 in Amsterdam,<br />

the Netherlands.<br />

Costs<br />

The costs are EUR 1,795 ex VAT. Catering (lunch) and course<br />

materials (hand-outs and exercises) are included in the price.<br />

The costs for participants who only want to participate in Part 1: SAP<br />

GRC Essentials (2 Days) are 795 ex VAT.<br />

Programme<br />

This course is divided into two parts which<br />

enables participants to register, based on<br />

their experience and learning goals<br />

Part 1: SAP GRC Essentials (2 Days)<br />

The first two days mainly focus on functional<br />

side of SAP GRC and covers:<br />

• Holistic view on GRC<br />

• Product overview of SAP GRC<br />

• New features and key enhancement<br />

• Implementation strategy and approach<br />

• Lessons learned<br />

• Key success factors<br />

• Best practices.<br />

Part 2: SAP GRC Deep Dive (3 Days)<br />

The following 3 days are designed to give you<br />

a more comprehensive understanding of the<br />

technical implementation of GRC and focuses<br />

on:<br />

• Installation requirements<br />

• Technical configuration basics of SAP<br />

GRC Access Control based on use cases<br />

and exercises, e.g.:<br />

− Access Risk Analysis<br />

− Access Request Provisioning<br />

− Business Role Management<br />

− Emergency Access Management<br />

− MSMP Based Workflow design for<br />

workflow<br />

− BRF+ based rule creation<br />

• Technical configuration basics of SAP<br />

GRC Process Control and Risk<br />

Management based on use cases and<br />

exercises.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 13


In-house training, custom training and<br />

learning programmes<br />

<strong>Deloitte</strong> offers more than just the trainings referred to before. We provide in-house trainings<br />

too: anything from standard trainings to trainings tailored to your organization. We can even<br />

set up a full learning programme uniquely geared to your organization.<br />

In-house training<br />

In-house or in-company training distinguishes itself because it<br />

specifically focuses on your organization. The training can thus be<br />

adapted to your wishes.<br />

Standard training<br />

Apart from our offerings discussed in this flyer, we have a great choice<br />

of standard trainings available. We can consult with you to include<br />

specific priority aspects you consider to be important.<br />

Custom training<br />

A careful analysis of your learning needs and an extensive intake will<br />

enable us to prepare a custom training. This will allow you to train and<br />

educate your professionals very effectively. Since the course materials<br />

and examples will be geared to your own organization, your<br />

professionals will be able to immediately use what they have learned in<br />

their daily practice.<br />

Learning programme<br />

In addition to offering in-house trainings, we also offer you the option to<br />

prepare a full, tailored learning programme, entirely geared to your<br />

organization, the business objectives, and the employees’ learning<br />

needs.<br />

Costs<br />

Feel free to contact us for more information on pricing or to get a quote.<br />

Even a relatively low number of participants can make an in-house<br />

training more economical than a regular external training.<br />

Further information<br />

If the training you need is not stated here, or if you want further<br />

information on our training and learning offering, please contact us.<br />

Contact details can be found in the back of this brochure.<br />

Topics<br />

<strong>Deloitte</strong> provides a great deal of trainings all<br />

across the world, so we have a large number<br />

of standard trainings and topics readily<br />

available. These are just some of the<br />

trainings we have on offer:<br />

• <strong>Security</strong> & Risk Management<br />

(Governance, Frameworks, Architecture,<br />

Transformation)<br />

• Business Continuity & Disaster Recovery<br />

• Identity & Access Management<br />

• <strong>Security</strong> Architecture<br />

• <strong>Cyber</strong> <strong>Security</strong><br />

• Infrastructure Protection<br />

• Application Protection<br />

• Secure Software Development<br />

• End User security (Awareness, Social<br />

media, Mobile devices)<br />

• Vendor control (Cloud computing,<br />

Assurance)<br />

• Privacy<br />

• Hacking and Vulnerability Assessments<br />

Specific systems & certifications<br />

In addition, we offer security trainings on<br />

specific systems, such as SAP and Oracle.<br />

We can arrange trainings for most of the<br />

security certifications (CISSP, CISM, CISA,<br />

CEH, etc.) as well.<br />

Training forms<br />

We are able to provide various training forms<br />

such as: classroom based, e-learnings,<br />

webinars, workshops and game-based.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 14


Your facilitators<br />

Our professionals are your facilitators − sharing with you their practical knowledge. Our course offerings distinguish<br />

themselves by being topical and effective. The limited number of participants per course offers plenty of space for<br />

interaction between facilitator and participants in a stimulating and pleasant atmosphere. The following professionals<br />

facilitate the courses mentioned in this brochure:<br />

Marko van Zwam<br />

Partner <strong>Deloitte</strong> <strong>Security</strong> & Privacy<br />

Marko is a partner within <strong>Deloitte</strong> Risk Services and leads the <strong>Security</strong> & Privacy team, which consists of more than<br />

100 professionals. He has over 18 years of experience in IT, IT <strong>Security</strong>, IT Audit and IT Risk Management.<br />

Gijs Hollestelle<br />

Facilitator CISSP Certification<br />

Gijs is a senior manager in the <strong>Security</strong> & Privacy team. Gijs has over 8 years of experience in security issues,<br />

from security awareness to IT infrastructure security and Ethical Hacking. Gijs was part of the winning team at the<br />

Global <strong>Cyber</strong>Lympics 2013.<br />

Coen Steenbeek<br />

Facilitator HackLab – Hands-on Hacking<br />

Coen is a manager in the <strong>Security</strong> & Privacy team. Coen specializes in both technical engagements like<br />

vulnerability assessments and in performing security management related tasks (ISO27001 / 2). During his career<br />

at <strong>Deloitte</strong> Coen has earned the RE, CEH, CISSP, CISM and CGEIT certifications and he was part of the winning<br />

team at the Global <strong>Cyber</strong>Lympics 2013.<br />

Trajce Dimkov<br />

Facilitator SCADA <strong>Security</strong><br />

Trajce is a manager within the <strong>Security</strong> & Privacy team and has over 7 years of experience in ICT infrastructure<br />

and security. Trajce specializes in both security management of industrial control systems and vulnerability<br />

assessment. Previous to his work at <strong>Deloitte</strong>, Trajce did a PhD at the University of Twente on social engineering<br />

and physical penetration testing and is currently involved in many vulnerability assessments that include these two<br />

ingredients.<br />

Frank Hakkennes<br />

Facilitator SAP <strong>Security</strong> & HackLab: SAP<br />

Frank is a manager in the <strong>Deloitte</strong> <strong>Security</strong> & Privacy Risk Services team. Frank specializes in security<br />

management, particularly for SAP environments. Frank is a certified SAP <strong>Security</strong> Consultant and has been<br />

responsible for audit, implementation and advisory services in respect of (SAP) security and configuration<br />

management.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 15


Tom-Martijn Roelofs<br />

Facilitator HackLab – Introduction <strong>Cyber</strong>crime<br />

Tom-Martijn is Director <strong>Cyber</strong> <strong>Security</strong> in the <strong>Security</strong> & Privacy team. Tom-Martijn has extensive experience in<br />

combating cybercrime, IT management and audit. As a former head of ABN AMRO’s cybercrime response team,<br />

Tom-Martijn has gained extensive expertise in incident response, fraud detection, network security monitoring and<br />

crisis. He has set up a training program for combating financial cybercrime.<br />

Henk Marsman<br />

Facilitator CISM Certification<br />

Henk is a senior manager in the <strong>Security</strong> & Privacy team and has over 13 years of experience in IT <strong>Security</strong> and<br />

risk management. Henk focusses on security management and identity & access management. He also has a<br />

background in public key infrastructure and network security. Currently Henk co-leads the <strong>Security</strong> management<br />

practice within the <strong>Security</strong> & Privacy team.<br />

Martijn Knuiman<br />

Facilitator HackLab – Hands-on Hacking<br />

Martijn is a senior manager in the <strong>Security</strong> & Privacy team. Martijn has over 10 years of experience in ICT<br />

infrastructure and security. Martijn has extensive experience in Network Operating Systems, IT forensics, Data<br />

Leakage Prevention, <strong>Security</strong> Governance, <strong>Security</strong> Management and Ethical Hacking.<br />

Annika Sponselee<br />

Facilitator Prepare for Privacy<br />

Annika is a senior manager within the <strong>Security</strong> & Privacy team. Annika has over 8 years of experience in privacy<br />

law and data protection law. Before Annika started working at <strong>Deloitte</strong>, she was a lawyer at Baker & McKenzie,<br />

also in privacy law. Her daily activities include advisory and support services for large companies and<br />

multinationals on national and international privacy law issues. Annika regularly gives trainings and presentations<br />

on privacy legislation.<br />

Thijs Bosschert<br />

Facilitator HackLab – Malware Analysis<br />

Thijs is a manager in the <strong>Security</strong> & Privacy team. Thijs has over 8 years of experience in Incident Response and<br />

Forensics and over 11 years of experience in IT security. Thijs has experience in conducting and managing<br />

incident responses and forensics investigations, pen-testing and malware research. Thijs was part of the <strong>Deloitte</strong><br />

Global <strong>Cyber</strong>Lympics team that won at the Global <strong>Cyber</strong>Lympics 2013.<br />

Ruud Schellekens<br />

Facilitator CISSP Certification<br />

Ruud is a manager in the <strong>Security</strong> & Privacy team. With a strong IT background, Ruud started as an IT auditor. In<br />

this role he obtained a broad knowledge of the security of ERP applications and IT infrastructures. In addition,<br />

Ruud has been involved in developing various <strong>Deloitte</strong> security auditing tools. Ruud is a certified CISM, EDP<br />

auditor, CISSP and GRAPA professional.<br />

Floris Schoenmakers<br />

Facilitator SCADA <strong>Security</strong><br />

Floris is a senior consultant within the <strong>Security</strong> & Privacy team. Floris has done research into the increasing<br />

integration of industrial and business IT in SCADA environments and the vulnerabilities associated with this<br />

integration. Floris is certified CISSP and CSSA. His main focus is the security of industrial systems and<br />

infrastructure.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 16


Suzanne Janse<br />

Facilitator SAP GRC<br />

Suzanne is working as director in the <strong>Security</strong> & Privacy team of <strong>Deloitte</strong> Risk Services. She heads the ERP Risk<br />

Consulting and GRC (Governance, Risk & Compliance) software practice; a team of highly motivated subject<br />

matter experts in the field of ERP (SAP, Oracle) <strong>Security</strong> & Controls and GRC software implementation.<br />

Ashees Mishra<br />

Facilitator SAP GRC<br />

Asheesh works as a manager in the <strong>Security</strong> & Privacy section of <strong>Deloitte</strong> Risk Services. He has more than 9 years<br />

of work experience in area of SAP GRC Access control, Process Control, Risk Management, SAP <strong>Security</strong> and Net<br />

weaver IDM. He has lead and been part of several SAP GRC (AC/PC) rollout projects, Controls and SOX<br />

engagements, SAP <strong>Security</strong> and authorization design.<br />

Willem van der Valk<br />

Facilitator Oracle GRC<br />

Willem is an experienced senior manager within the <strong>Security</strong> & Privacy team of <strong>Deloitte</strong> Risk Services. He has a<br />

background in Oracle eBS and has a broad knowledge of Governance, Risk & Compliance (GRC). Willem has<br />

been involved in many Oracle ERP and GRC implementations. Furthermore he regularly performs Oracle <strong>Security</strong><br />

and Controls assessments at different type of clients.<br />

Berry Kok<br />

Facilitator Oracle GRC<br />

Berry is an experienced junior manager within the <strong>Deloitte</strong> Risk Services department and has a focus on GRC,<br />

<strong>Security</strong> and Controls, User Access Management and Segregation of Duties within Oracle applications. Berry<br />

developed his Oracle expertise by following multiple courses at the Oracle University (i.e. GL, AP, AR,<br />

Procurement, GRC) and performing several Oracle security related assignments, ranging from ERP and GRC<br />

implementations, SOD reviews and <strong>Security</strong> & Controls audits.<br />

Marlous Theunissen<br />

Facilitator HackLab – Malware Analysis<br />

Marlous is a consultant in the <strong>Security</strong> and Privacy team of <strong>Deloitte</strong> Risk Services. Marlous graduated cum laude in<br />

Computer Science and Engineering with focus on both security and algorithms. She has gained experience in<br />

penetrations tests and malware analysis, and passed both the CISM and CISSP examinations this year.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 17


Additional course information<br />

Number of participants<br />

Depending on the nature of the course and the level of<br />

interaction we have a maximum number of participants<br />

per course.<br />

<strong>Course</strong> hours<br />

9:00 to 17:30 hours, including lunch.<br />

Location<br />

Our courses are being facilitated at our office in<br />

Amsterdam. Approximately one month before the<br />

course date you will receive more information about the<br />

exact location of the course.<br />

Language<br />

The courses will be given in English or Dutch,<br />

depending on the participants’ preferred language. The<br />

course material is in English.<br />

Permanent Education<br />

<strong>Deloitte</strong> Academy is a NBA (The Netherlands Institute<br />

of Chartered Accountants) acknowledged institution.<br />

These courses will earn you PE points.<br />

Registration<br />

You can register for this course through<br />

www.deloitte.nl/academy.<br />

More information<br />

For more information about these courses contact:<br />

<strong>Deloitte</strong> Academy<br />

Postbus 2031<br />

3000 CA Rotterdam<br />

Phone: 088 − 288 9333<br />

Fax: 088 − 288 9844<br />

E-mail: nlacademy@deloitte.nl<br />

Internet: www.deloitte.nl/academy<br />

Cancellation policy<br />

Please refer to our website for our Terms and<br />

Conditions and cancellation policy.<br />

<strong>Deloitte</strong> Academy reserves the right to cancel the<br />

course in the event of insufficient registrations. You will<br />

be informed about this on time.<br />

<strong>Course</strong> overview − <strong>Security</strong> & Privacy 18


Contact us<br />

<strong>Deloitte</strong> Academy<br />

Wilhelminakade 1<br />

3072 AP Rotterdam<br />

Postbus 2031<br />

3000 CA Rotterdam<br />

Phone 088 288 9333<br />

Fax 088 288 9844<br />

nlacademy@deloitte.nl<br />

www.deloitte.nl/academy<br />

<strong>Deloitte</strong> refers to one or more of <strong>Deloitte</strong> Touche Tohmatsu Limited, a UK private company limited by guarantee, and its<br />

network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.nl/about for a<br />

detailed description of the legal structure of <strong>Deloitte</strong> Touche Tohmatsu Limited and its member firms.<br />

<strong>Deloitte</strong> provides audit, tax, consulting, and financial advisory services to public and private clients spanning multiple industries.<br />

With a globally connected network of member firms in more than 150 countries, <strong>Deloitte</strong> brings world-class capabilities and<br />

high-quality service to clients, delivering the insights they need to address their most complex business challenges. <strong>Deloitte</strong> has<br />

in the region of 200,000 professionals, all committed to becoming the standard of excellence.<br />

This communication is for internal distribution and use only among personnel of <strong>Deloitte</strong> Touche Tohmatsu Limited, its member<br />

firms, and their related entities (collectively, the “<strong>Deloitte</strong> Network”). None of the <strong>Deloitte</strong> Network shall be responsible for any<br />

loss whatsoever sustained by any person who relies on this communication.<br />

© 2014 <strong>Deloitte</strong> The Netherlands

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!