Proactive Cybersecurity for IT Infrastructure Professionals

Hands-on training course developed by BDA, designed for IT security specialists and infrastructure managers. The course aims to provide in-depth knowledge and practical skills in managing cybersecurity risks, implementing protection measures, and responding to security incidents effectively. Participants will learn best practices in access control, network security, vulnerability management, compliance, and cloud security, while working with modern tools and technologies. The training concludes with practical exercises and a final assessment to ensure real-world application of acquired competencies.

Course duration, academic hours: 80
Price (excl. VAT) 2600,00 
Price (with VAT): 3146,00 
Lecturer: Uldis Lībietis
Apply for the course:

Apply or ask a question!

 

If you want to apply for the course or ask a question about it, feel free to use this form.

Please enter your first and last names
Please enter company name
Please enter your phone number
Please enter your email

Thank you! We will contact you.

Course Target

To provide participants with in-depth knowledge and practical skills to effectively manage cybersecurity within an organization’s IT infrastructure, identify and mitigate security risks, implement appropriate protection measures, and ensure compliance with regulatory requirements.

Audience
  • IT Security Specialists

  • Security Managers

  • System and Network Administrators

  • IT Infrastructure Managers

  • DevOps and IT Support Team Members

  • Individuals planning to specialize in cybersecurity

At Course Completion you will be able to
  • Perform cybersecurity risk analysis and plan risk management measures

  • Manage access and identity security using best practice principles

  • Configure and monitor security solutions (firewall, IDS/IPS, SIEM, etc.)

  • Respond to incidents, conduct analysis, and ensure proper documentation

  • Ensure system security updates and manage vulnerabilities

  • Develop and maintain security policies and procedures

  • Ensure compliance with GDPR, ISO 27001, and other applicable standards

Course Program (80 academic hours)
  1. Cybersecurity Fundamentals and Threat Landscape
    • Key cybersecurity terminology
    • Types of attacks (malware, ransomware, phishing, DDoS, insider threats)
    • Current trends and real-world examples
    • Social engineering and the human factor

  2. Risk Management and Security Strategy
    • IT security risk assessment methods
    • Selection and implementation of security controls (NIST, CIS, ISO 27001)
    • Cybersecurity policy and strategy development
    • Business Continuity and Disaster Recovery (BCP/DRP) planning

  3. Network Security
    • Segmentation, VLANs, VPNs
    • Management of trusted and untrusted zones
    • Attack surface reduction
    • Firewall and IDS/IPS configuration and monitoring
    • Network monitoring tools (Wireshark, Zeek, NetFlow)

  4. Identity and Access Management (IAM)
    • Authentication and authorization mechanisms
    • Implementation of multi-factor authentication (MFA)
    • AD/LDAP and access rights management
    • Privileged Access Management (PAM)

  5. Security Monitoring and Log Analysis
    • SIEM implementation and configuration
    • Log analysis (Windows, Linux, network devices)
    • Setting alerts and response actions
    • Identifying and classifying incidents

  6. Incident Management and Response
    • Incident response process (preparation, detection, containment, eradication, recovery, lessons learned)
    • Incident documentation and reporting
    • Digital forensics tools and techniques
    • Minimizing business and reputational impact

  7. Security Testing and Vulnerability Management
    • Vulnerability scanning tools (Nessus, OpenVAS, Qualys)
    • Patch management process
    • Basics of penetration testing
    • Automation scripts and best practices

  8. Compliance, Standards, and Regulations
    • GDPR, ISO/IEC 27001, NIS2
    • Documentation and audit requirements
    • Internal controls and compliance reporting
    • Employee training and awareness programs

  9. Cloud Security and Modern Architectures
    • Security in cloud environments (AWS, Azure, GCP)
    • Zero Trust model
    • DevSecOps approach
    • Security in containerized environments (Docker, Kubernetes)

  10. Practical Sessions, Simulations, and Final Assessment
    • Incident response simulation
    • SIEM and vulnerability scanning tasks
    • Development of real-world security policies and procedures
    • Final assessment (theory test + practical assignment)

If you would like to learn more about this course, please contact us by phone at +371 67505091 or email us at mrn@bda.lv.