• Fundamentals of Cyber Security Part2

      Get ready for Sunday, Sep 05, 2021, covering the below topics - GRC - Cyber Security Governance - Risk Management - Business Continuity Planning (BCP) and Disaster Recovery - Personal Security Hygiene, do's and don't to keep yourself safe get in touch for more details www.charitynz.org/events admin@charitynz.org

    Health and Safety expert Training

    Agenda What is a health and safety expert? Legislation, ISO45001, International Associations Health and Safety Management System How to identify and manage hazards How to audit workplaces How to investigate incidents Career Pathway as a Health and Safety Expert

  • Cyber Security Basics to Advanced

    Difference between Privacy and Confidentiality Day-to-day use cases for Privacy concerns and how to deal with them - Cost of convenience. Risk Management life Cycle Cyber Governance and Assurance Attack vectors and Attack surfaces      

    Coding Robotics 3D Modelling and Printing for Youth

    We are holding these sessions during term 3 break (October 2021) Pls, note that these sessions are for ages 8-15. Please get yourself registered by sending the following details to holidays@charitynz.org   https://docs.google.com/forms/d/e/1FAIpQLSciBmlsKi3Ih2yehkVn9CrFHRuIZIyDqznYc_2rUDGSiBud3Q/viewform

    School Holidays STEM Workshop

    3 Days workshops from 9 AM to 4 PM with a variety of activities Robotics Coding 3D Modelling/Printing Mathematics Science Fill the form to get your child to register for these workshops https://forms.gle/1sdbU8o7UsH2FQrV9

    DDOS Attacks and its mitigation

    DDoS - A cheap service to be so expensive? We will briefly talk about ; - Ransomware and Ransome notes - Innovative attack techniques - Disruption of Stock exchanges - Spy agencies, war rooms, etc ….sound like a movie !!! This talk will be a focus on A day in the life of a Defender […]

    Cyber Security Advanced GRC – Focused on Risk, Privacy and Business continuity Management

    Introduction to GRC Difference between Privacy and Confidentiality How to maintain your personal privacy consideration Risk Management Life cycle, Risk heat map Case study - Producing Risk Management document Q&A 10-15 Minutes break Practical - Hands-on using GRC tool Business Continuity Planning and Disaster Recovery How to maintain your personal Cyber Hygiene Q&A Register yourself  […]

    Cloud SC900 – Microsoft Security, Compliance and identity Fundamentals

    High-Level Agenda of the workshop The Zero-Trust methodology, Shared Responsibility Model, Threat Detection, Defence in Depth, Cloud Adoption Framework, and Identity Concepts Microsoft Identity, Authentication, Access Management, Identity Protection and Governance Capabilities of Azure AD Microsoft Security Solutions capabilities including Azure NSGs, DDoS protection, Firewall, Bastion, WAF, and Encryption Azure Security Management capabilities including, Security […]

  • Vulnerability scanning and Web Application Testing

    Difference between Vulnerability, Threat, and Risk Vulnerability scan Web Application standards Q&A 10-15 mints break OWASP top 10 Web Application testing Q&A and feedback form submission request Register yourself - https://forms.gle/aLL36ht7aMevSnCy9

    Vulnerability Scanning and Web Application Testing

    Difference between Vulnerability, Threat, and Risk Vulnerability scan Web Application standards Q&A 10-15 mints break OWASP top 10 Web Application testing DVWA - damn vulnerable web app Q&A and feedback form submission request Register yourself - https://forms.gle/aLL36ht7aMevSnCy9  

  • Securing Microsoft Azure Cloud

    Protecting Azure VM Just in time Azure Security center Azure Defender Microsoft Sentenial Register yourself - https://forms.gle/aLL36ht7aMevSnCy9  

    Advance Cyber Security Part 2

    How to ensure the availability Elements of Cyber Resiliency Business Continuity Management Disaster Recovery Planning Five Elements of BCM/DR Register yourself on this link https://forms.gle/aLL36ht7aMevSnCy9 or fill up the form below: Loading…