Cyber security threats continue to increase in India, putting more businesses at risk of falling victim to cyber attacks annually. This course is designed to empower you with the necessary expertise and abilities to proactively prevent and defend against these threats. Ensuring robust Cyber Security measures is a fundamental necessity for any business, as it is vital to establish and maintain the proper protocols to ensure the utmost protection for your enterprise.
Focused areas of the course
· Cloud Security
· Dark Web Monitoring
· Attack Surface Monitoring
· API Security
· Introduction of Cloud Security
· Basics of Cloud Computing and Cloud Security
· Shared responsibility model in Cloud
· Understanding the Dark Web
· What is Dark Web
· How cyber criminals operate on Dark Web
· Case study: Gmail and other monitoring tools for users to monitor Dark Web
· Understanding Attack Surfacers
· Definition and components of an attack surface
· Key challenges in attack surface Management
· Introduction to API security
· What are API
· Importance of API security for Business
· Common threats to API’s
· Key threats in Cloud Environment
· Data Breaches and misconfigurations
· Insider threats and third party risks
· Introduction to AI ML techniques/use cases/model interpretability tools (SHAP & LIME)
· Gossip zero shot Learning architecture for privacy driven synchronization
· Gossip protocols key characteristics/ Federated learning
· Hands on session on How to utilize AI tools for log monitoring
· Implementing Cloud Security Best Practices
· Identity and access management
· Data protection strategies (encryption backups)
· Continuous monitoring and compliance
· Threats from the Dark Web
· Data Breaches and stolen credentials
· Block- market operations and corporate espionage
· Security Dev-ops
· Identifying and Assessing Attack Surface Risks
· Tools and Techniques for mapping attack surfaces
· Identifying vulnerabilities
· Understanding API Vulnerabilities
· OWASP – API Security Top 10
· Case studies – Real world API breaches
· Case study – Crowd strike Fraud
· Case study – Illegal mining of Crypto
· Detection and tracking of Fake apps in Play store and Pasture removal
· Reducing Attack Surface
· Strategies for minimizing exposure
· Role of Continuous Monitoring and Automation
· Case studies – Star Health Insurance Issues
· Recent Ransomware attacks and Responses (CERT- IN acts)
· Implementation of passkeys and MFA
· Authentication and authorization (OAuth,JWT, etc)
· API monitoring and logging
· IT & Cyber Security Professional
· Financial Professionals
· Data Protection Managers, Officers, Consultants
· Legal Compliance Officers
Shrikrishna Kulkarni possess more than 26+ years of diverse experience in Banking, Pharma, Manufacturing, Telecom(M&E), and consulting experience in Infrastructure, Cloud, Managed Security Services (MSS), IT Audit, SAP, HANA, technologies supporting infrastructure and applications domain.
Complex IT projects and issues that encompass a wide range of internal and external systems, components, and processes
· Cloud – Private, Public & Hybrid
· Application & infrastructure security
· Business continuity
· Project Management
· Pre-Sales
· Audit & Compliance
Experience in BCP, IT DR solutions (Sanovi, Perpuity) and Implementation, Crisis Management.
Designing “DRAAS” as Service, BCMS/ ISMS, IT Service Continuity.
Implementation Experience includes BCP/DR Planning, Impact Analysis on Business, Database Replications Solutions, DR automation solutions, Infrastructure and Applications DR for Complex projects in Pharma, Banking, Manufacturing, M&E