KADDB Cyber Security Academy (KCSA).

KADDB Cyber Security Academy (KCSA).

KADDB Cyber Security Academy (KCSA).
Location: Al Hussein Technical University (HTU), King Hussein Business Park, Amman-Jordan.

 

The scale and damage of cyber threats have increased severely over the past years, and will continue to do so.  Governments and organizations of all sizes must be prepared to withstand unexpected and high impact cyber threats. Yet people with the cyber security skills to do the work required to protect and defend a country’s national security and critical infrastructure , businesses, networks, systems and data are in short supply around the world.

 

In response, KADDB has established the KADDB Cyber Security Academy (KCSA) in partnership with the PGI — a cyber security training provider which specializes in developing training centers and programs internationally. KCSA provides first-of-its-kind training programs in Jordan, building on PGI Cyber Academy courses; certified by the UK Government’s national technical authority for Cyber Security, GCHQ.

 

KCSA offers hands-on, immersive technical, vocational skills training, learning and practice, in state-of-the-art labs using its training Rig and test and exercise Range. KCSA courses cover the range of skills required to start a career in cyber security or broaden expertise in multiple cyber security roles.

 

KCSA’s intensive training program enables and encourages new cyber security professionals to take advantage of employment opportunities created by the current skills shortfall in Jordan and globally.

 

KCSA’s Cyber Range offers Red and Blue team exercises. It also simulates realistic conditions, including typical environments and infrastructure run by ordinary businesses or departments. The Range enables multiple security testing methods to be carried out against various applications in different scenarios. Tests include:

-   Internal and External Penetration Testing.

-  Application and Infrastructure Penetration Testing.

-   Disaster Recovery.

-   Malware Simulation.

Three of PGI’s certifications that are offered by KCSA - CSA-Executive, Digital Forensics and Incident Response Associate, and Qualified Penetration Test Professional - have been accepted by the UK’s Bournemouth University as contributing up to 40 transferable credit hours of prior learning towards its MSc in Cyber Security & Human Factors.

 

For more information, call: + 962 6 4603230

Or Send an e-mail to:   KCSA@kaddb.mil.jo


The Courses provided by KCSA.

 

Digital Forensics and Incident Response Skills Courses

 

Level 2: DFIR Associate (DFIRA)
This six day Digital Forensics and Incident Response course gives delegates the skills and knowledge required to work effectively in a digital forensics or incident response team. It has been mapped against the International Institute of Security Professionals Cyber Security Skills Framework at Level 2.

Learning outcomes:

- How to discover host or network breaches and triage attacks.

- How malware typically finds its way onto a system.

- How to explain the variations of malware and cyber threats.

- How to find and identify important artefacts.

Certification:

GCHQ Certified Incident Response for IT or GCHQ Certified Operational Digital Forensics.

 

Level 3: Qualified DFIR Practitioner (DFIRP)

This six day Digital Forensics and Incident Response course gives delegates the skills and knowledge required to work effectively as a certified digital forensic and incident response professional. It has been mapped against the International Institute of Security Professionals Cyber Security Skills Framework at Level 3.

Learning outcomes:

- How to contain potentially malicious software securely and safely.

- How to use tools and evidence to determine the malware used in an attack, including rootkits, backdoors, and Trojan horses, and choose appropriate defences and response tactics.

- How to use built-in command-line tools to detect an attacker's presence on a machine.

- How to use memory dumps and memory analysis tools to determine an attacker's activities, the malware installed, and the pivot points used by the attacker across the network.

- How to detect the artefacts and impact of exploitation through process, file, memory, and log analysis.

- How to find compromised machines, attacker-controlled accounts, sniffers, and backdoors.

- How to build an isolated, controlled laboratory environment for analysing the code and behaviour of malicious programs.

 

Certification:

GCHQ Certified Security Operations Centre Incident Responder.

 

Penetration Testing and Ethical Hacking Skills Courses

 

Level 2: Ethical Hacking Associate (EHA)

 

This five day course gives delegates the skills and knowledge required to work effectively in a penetration testing team. It has been mapped against the International Institute of Security Professionals Cyber Security Skills Framework at Level 2.

 Learning outcomes:

- How to enumerate and map a network.

- How an attacker gains and sustains access to a remote network.

- How to send client and server side exploits using the Metasploit Framework.

- How to obtain user credentials and show how they are used in a compromised network.

- How to manage and exploit network devices.

- How an attacker maintains a low profile in a compromised network.

 

Certification:

GCHQ Certified Penetration Test Associate.

 

 

 

Level 3: Qualified Penetration Test Practitioner (PTP)

This six day course gives delegates the skills and knowledge required to work as a fully qualified and certified penetration tester. It has been mapped against the International Institute of Security Professionals Cyber Security Skills Framework at Level 3.

 Learning outcomes:

- How to enumerate and profile applications.

- How to exploit and manipulate applications and operating systems.

- How to scan networks and servers to analyze network traffic and enumerate web browsers.

- How to use web-based attacks as a primer for further attacks, obtain credentials and gather information on web servers.

- How to consolidate technical, risk management, and other operational skills and knowledge to conduct an end to end penetration test as a certified professional security consultant.

 

Certification:

GCHQ Certified Advanced Threat Methodology.

 

 

 

 

 

Information Security Policy Skills Training

 

Level 2: Certificate in Information Security Management Principles (CISMP)
This 5 day Information Security Policy course gives the skills, knowledge and certification required to take up an entry level post as a cyber security professional in an information security governance, risk and compliance policy or audit team. It has been mapped against the International Institute of Security Professionals Cyber Security Skills Framework at Level 2.

 Learning outcomes:

- An overview of cyber security concepts, issues and tools.

- Different classes of attacks.

- Principles of information security.

- Systems and application threats and vulnerabilities.

- How to implement techniques and solutions to protect infrastructure.

- Risk management processes and practices.

 

Certification:

BCS Certificate in Information Security Management Principles.

 

 

Awareness Training

 

Level 1: Cyber Security Awareness (CSA)
This GCHQ certified awareness course provides end-users with the awareness needed to mitigate information security risks.
Learning outcomes:

- How to reduce the risk of a cyber security breach.

- How to recognize threats and vulnerabilities to information assets.

- Appropriate behavior for users who have access to valuable information assets.

- How to protect your organization’s brand and reputation from cyber threats.

 

Level 1: Cyber Security Awareness– Executive (CSA-Executive)

This GCHQ certified awareness course provides senior executives and IT managers with an overview of cyber security topics. It builds knowledge of cyber security issues and ensures proper decision-making through overall awareness of cyber threats.

 

 

 Cyber Range Exercises

 

Red-Blue Team Exercise (RBT)

This exercise simulates cyber warfare. Players are divided into a specialist Red team and a specialist Blue team. The Red team has to find and exploit vulnerabilities in a system. The Blue team defends their organization by finding vulnerabilities and reacting to breaches.

 

Capture the Flag (CTF)

Pieces of information (‘flags’) are encrypted or hidden on servers. Participants earn points for breaking, hacking or decrypting a system and capturing the ‘flags’ under different challenges.


print