Ako ki hono fakafuofuaʻi ʻo e fakatuʻutamaki

ʻIloʻi mo maluʻi hoʻo ngaahi koloa mahuʻinga ʻaki haʻo fakahoko hoʻo ngaahi fakafuofuaʻi ʻoku tuʻu fakatuʻutamaki

Fili ʻa e ako mata-ki he-mata

ʻOku ako ʻa kinautolu ʻoku kau maí ʻi he kalasi ʻaho ʻe ua ko ʻení ke nau fakahoko ʻa e ngaahi fakafuofuaʻi ʻo e maluʻi ʻoku tuʻu fakatuʻutāmakí. ʻOku ʻomi ʻe heʻetau founga organisations ha founga fakaʻauliliki ʻoku nofotaha ʻi he ngaahi koloa ʻo e fakamatala ʻi honau tuʻunga ngaue. Te ke fakaʻaongaʻi ʻa e meʻangaue fakamuimuitaha ʻoku tuʻu fakatuʻutamaki fakamuimuitaha ʻi he kalasi.

Throughout the course, you will participate in in-class exercises and discussions, including activities for risk identification, analysis, and response.

 

Hili hono fakakakato ʻo e kalasi, ʻe lava ʻa kinautolu ʻoku kau mai ʻo:

  • Tanaki mo organise ha fakamatala ʻoku tuʻu fakatuʻutamaki ʻo fakafou ʻi he ngaahi ʻinitaviu, vakaiʻi ʻo e fakamatala fakapepa, mo hono ʻanalaiso fakatekinikale

  • Faʻu ha tuʻunga ʻe lava ke fakafuofuaʻi 

  • ʻIloʻi, analyse mo prioritise ʻa e fakamatala ʻoku tuʻu fakatuʻutamaki.

  • Fakaleleiʻi e ngaahi ʻekitiviti pule laveangofua ʻaki haʻo vakai ki ai ʻi ha tuʻunga fakatuʻutamaki

  • Mahino ʻa e ʻuhinga ʻoku mahuʻinga ai hono tokangaʻi ʻo e tuʻunga fakatuʻutamaki ki hono tokangaʻi ʻo e kautaha ʻoku tuʻu

  • Fakatupulaki ha ngaahi founga tali ʻoku tuʻu fakatuʻutamaki ʻoku feʻunga mo e ngaahi fie maʻu fakapisinisi ʻa e organisation

 

ʻI he tukutaha e tokanga ki hono fakalele ʻo e ngaahi meʻa ʻoku tuʻu fakatuʻutamaki ki he ngaahi koloa, ʻoku ako ʻa kinautolu ʻoku kau mai ke nau sio ki he fakafuofuaʻi ʻo e tuʻunga fakatuʻutamaki ʻi he puipuituʻa ʻo e ngaahi taumuʻa mahuʻinga mo e tuʻunga fakatuʻutamaki ʻo e organisation. 

Fili 2-fakafuofuaʻi ʻo e ngaahi meʻa ʻoku tuʻu fakatuʻutamaki ʻi he ʻInitaneti

Ko e faingamalie ʻo e ako ʻi he ʻInitaneti ke ke lava ʻo tuʻu ʻi he sitepu takitaha, ʻalu ʻo fakahoko pe fekumi ki he meʻa ʻoku ke fie maʻu kimuʻa pea ke toki fakalakalaka ki he sitepu hoko.  ʻOku ʻuhinga ʻa e founga ko ʻeni ki he fakaʻosinga ʻo e kalasi; te ke fakakakato hoʻo fakafuofuaʻi ʻo e ngaahi meʻa ʻoku tuʻu fakatuʻutamaki ʻi hoʻo organisation.

cyber_reconnaissance.png

There are nine modules in this course and cover the Eight Steps in Conducting a Cyber Risk Assessment.

 

Comes complete with all templates and training on how you conduct a Cyber Risk Assessment as per the Software Engineers Institute recommendations.

 

The Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro™ method developed by the Carnegie Mellon University, Pittsburgh USA.

 

The OCTAVE Allegro™ approach provides the Public and Private Sectors a comprehensive methodology that focuses on information assets in their operational context. Cyber risks are identified and analysed based on where they originate, at the points where information is stored, transported, and processed. By focusing on operational risks to information assets, participants learn to view risk assessment in the context of the Public and Private Sectors strategic objectives and risk tolerances.

Ko hai ʻoku totonu ke ne fai e kalasí?

  • Ko e niʻihi fakafoʻituitui ʻoku nau fie maʻu ke nau lava ʻo fakahoko ʻenau ngaahi fakafuofuaʻi ʻi he fale ʻoku tuʻu fakatuʻutamaki

  • C-lahi, kau palofesinale maluʻi, palani hokohoko ʻo e pisinisi, talangofua ki he kau ngaue, kau pule tuʻu fakatuʻutamaki mo e niʻihi kehe

  • ʻOku fie maʻu ke fakahoko ʻe he kau ngaue ha sivi ʻoku tuʻu fakatuʻutamaki ke fakafiemalieʻi ʻaki pcI ngaahi fie maʻu ki he UESS

  • Fakamatala ki he kau ngaue fakatekinolosia ʻoku nau fie fakatupulaki ʻenau ʻilo ki he cybersecurity

Cyber Quote 3.png
Cyber Quote 29.png
Cyber Quote 23.png