BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CharityNZ - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:CharityNZ
X-ORIGINAL-URL:https://charitynz.org
X-WR-CALDESC:Events for CharityNZ
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20200101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VTIMEZONE
TZID:Pacific/Auckland
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20200404T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20200926T140000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20210403T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20210925T140000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+1300
TZOFFSETTO:+1200
TZNAME:NZST
DTSTART:20220402T140000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+1200
TZOFFSETTO:+1300
TZNAME:NZDT
DTSTART:20220924T140000
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=UTC:20210904T160000
DTEND;TZID=UTC:20210925T190000
DTSTAMP:20260430T164436
CREATED:20210815T063154Z
LAST-MODIFIED:20210815T063154Z
UID:13527-1630771200-1632596400@charitynz.org
SUMMARY:Basics of Python Programming
DESCRIPTION:This module will cover the basics of Python programming from very basic to advanced which will ultimately lead to Data Processing and Machine learning. We will have 4 weekly sessions each of 3 hours with 15 mins break in between. Wellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nThis module is for all ages ( High School\, College\, Uni students\, and Professionals). Please get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession
URL:https://charitynz.org/event/basics-of-python-programming/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=UTC:20210828T160000
DTEND;TZID=UTC:20210828T190000
DTSTAMP:20260430T164436
CREATED:20210814T220011Z
LAST-MODIFIED:20210814T220011Z
UID:13495-1630166400-1630177200@charitynz.org
SUMMARY:Fundamentals of Cyber Security
DESCRIPTION:This Module is 3 hours workshop with interactive Q&A at the end. Wellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nPlease get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession \n  \nThis will cover below topics \nWorkshop contents\n1. Cyber Security Concepts\n\nCyber Security Concepts and Definitions\n– Difference between IT Security\, Information Security\, and Cyber Security\n– Assets\, Threats & Vulnerabilities\n– Likelihood\, Consequence\, and Impact\n– Inherent Risk\, Current Risk\, and Residual Risk\n\n\nCorporate Cyber Security Strategy\n– Supporting Business Goals and Objectives\n– Cyber Security Policy and Framework\n– Cyber Awareness\, Training and Education\nLaws\, Regulations and Industry Standards\nRoles and Responsibilities\nProfessional Organisations and Ethics\nQ&A\n\nExercise – Development of a cyber asset register \n2. Security Architecture\n\nSecurity Architecture Concepts and Definitions\n\n\nSecurity Architecture Frameworks\n– SABSA\n– TOGAF\n– PCI & ISO27K\nSecurity Architecture Design Principles\nService Models\n– Insourcing\n– Outsourcing\n– Managed Services – Single provider\, multiple providers\, prime provider\n– Cloud Services – Cloud service models and cloud deployment models\nQ&A\n\nExercise – Recommendations for service provider models in addressing risks\nExercise – Identification of security architecture design principles \n3. Implementing Security\n\nOSI and TCP/IP and Internet Models\nLow and high communication protocols/ports\n\n\nNetwork Fundamentals\n– Network Security\n– Network Topologies\n– Security Zones\n– Network Security Technologies\n– Virtualisation Benefits and Security Challenges\nVirtualization and VLAN segmentation\nEndpoint Security\n– Servers\, desktops\, laptops\, tablets\, mobile devices\, wearables\n– Endpoint Security Technologies\n– Specialised Endpoint Systems\nNext Generation of Endpoint with EUBA\nApplication Security\n– Software Development Lifecycle\n– OWASP Top 10\n– Web Application Firewall and Database Firewall\nData Security\n– Data owners\, data classification\, labeling\n– Access control\n– Data governance and lifecycle\n– Data remanence\nAustralian Signals Directorate Top 35\, E4 and E8\n– SANS Top 20 mapped to ASD Top 35 and other frameworks\n20 CIS controls of Centre for Internet Security\nQ&A\n\n\nExercise – Establish a data classification scheme\nExercise – Design a secure network topology with network security zones\, overlay the data classification scheme and placement of recommended perimeter and layered controls\n\n4. Cryptography\n\nCryptography Key Terms and Concepts\n\n\nSymmetric Algorithms\n– Data Encryption Standard (DES)\n– Triple DES\n– Advanced Encryption Standard (AES)\n– Other symmetric algorithms\nDiffie Helman groups and PFS\nAsymmetric Algorithms\nHashing Algorithms\nNon-Repudiation\nCryptographic Attacks\n– Side-channel\n– Birthday\n– Implementation\n– Other attack methods\nImplementing Cryptography in the Real World\n– Public Key Infrastructure (PKI)\n– Electronic Document Exchange\n– Virtual Private Networks (VPNs)\n– Secure e-mail\n– Steganography\n– Digital Watermarks\n– Wireless Security\n– Secure Shell\n– Key Management\nQ&A\n\n5. Risk Management\n\nRisk Management Concepts and Definitions\n– The stages of risk\n– Systemic and systematic Risk\, Risk Aggregation\n– Risk treatment options Risk Acceptance\, Reduction\, Transfer and Avoidance\n– Risk Appetite and Tolerance\n– What is GRC (Governance\, Risk Management\, and Compliance)\n– Risk Management Process\n– Quantitative\, Semi-quantitative\, and Qualitative Risk\n– Introduction to Critical Security Controls CIS20” under the first few lines of Risk Management Concepts and Definition\,\nThreats and Opportunities\n– Assessing the current threat landscape\n– Developing a threat taxonomy\n– Advanced Persistent Threats (APT)\n– Bring Your Own Device or Technologies\n– The Internet of Things\nBlock chain is a way to save IOT\nControls\, Countermeasures\, and Enablers\nBusiness Impact Analysis\n– Sample Business Impact Analysis Template\n– Sample Business Impact Levels\nQ&A\nExercise – Development of a threat taxonomy and identification of vulnerabilities\nExercise – Evaluate inherent risk\, current controls\, current risk\, recommend controls and residual risk\n\n6. Business Continuity and Disaster Recovery Planning\n\nBusiness Continuity Planning\n– NIST SP800-34 as a framework\n\n\nDisaster Recovery Planning\n– Relationship between the BCP and DRP\n– Events that trigger a BCP/DRP\nDeveloping the BCP and DRP\n– Application of NIST SP800-34\n– Initiation\n– Business Impact Analysis – BIA\n– Identification of preventive controls\n– Recovery strategies\n– Plan design and development and important BCP/DRP frameworks\n– Ongoing maintenance\nQ&A\n\nExercise – Identify and rank the most important business operations \n7. Incident Response\n\nNIST Cyber Security Framework\n– Identify\n– Protect\n– Detect\n– Respond\n– Recover\n\n\n\n\nCyber Forensics\n– General phases of the forensic process\n– Anti-forensics\n– Forensic media analysis\n– Network forensics\n– Forensic analysis of software\, Embedded devices\, and Electronic Discovery\nIncident Response Management\n– Security events and Security incidents\n– Incident Response Methodology using NIST SP800-61\nSecurity Assurance\n– Defining and implementing meaningful metrics\n– Configuration management\n– Minimum Security Baselines\n– Vulnerability Assessments\n– Penetration Testing\n– Security Audits (Internal & External Audits)\n– Security Assessments and their types\n– Log reviews\, retention\, centralization\, and analysis\n– Security Information and Event Management System (SIEM)\nNext-Gen of SIEM and Security Orchestration and Automated Response (SOAR)\nQ&A
URL:https://charitynz.org/event/fundamentals-of-cyber-security/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=Pacific/Auckland:20210821T160000
DTEND;TZID=Pacific/Auckland:20210821T180000
DTSTAMP:20260430T164436
CREATED:20210814T215119Z
LAST-MODIFIED:20210814T215119Z
UID:17326-1629561600-1629568800@charitynz.org
SUMMARY:Microsoft Azure Fundamental and Core Services - AZ900
DESCRIPTION:This Module leading to Azure AZ900 Certification consists of two modules. \nModule1 was already delivered on Saturday\, August 14\, 4-6 pm. \nModule2 will be delivered on Saturday\, August 21\, 2021\, 4-6 pm. \nWellington Professionals will attend physically in Brooklyn\, Wellington. Rest of the participants through remote video link \nPlease get yourself registered by sending the following details to Tech_stream@charitynz.org \nYour name \nPhone number \nAddress \nProfession
URL:https://charitynz.org/event/microsoft-azure-fundamental-and-core-services-az900/
END:VEVENT
END:VCALENDAR