- Introduction
- Why is it Necessary to Protect Against Cyber Security Threats?
- Data Breach Trends
- Define What is a Cyber Threat
- Where do Cyber Threats Come from?
- Examples of Cyber Threats
- What is Cyber Security Compliance?
- 5 Steps to Creating a Cyber Security Compliance Program

Online Trainings-Cyber Security Training For Managers (1DAY)
While cyber threats may not be in your control, your cyber security strategy is and you should be looking at a risk-based approach. This cyber security training course prepares managers and senior executives to understand, assess, and take a proactive approach in cyber security.
What you will learn from this course :
- Gain the knowledge of the threats faced by organizations and where they come from,
- what is required to create a Cyber Security Compliance Program,
- what is a Cyber Risk Assessment and why it is needed, how to rate your level of risk and how to perform a Cyber Risk Assessment.
- You will also cover what is a Cybersecurity Framework and what is required to prepare an Incident Response Plan.
- The course is a theory [Non-Technical]based course supported by group discussions and several exercises.
Who Should Attend:
Candidates should have a general awareness of information security and the need to respond to such events.
- Executives
- Incident managers
- IT managers
- Security officers
- Data Protection Officers (DPO)
- Manager – Compliance
Date & Time : Due to COVID this course is currently being run as an online course. Please contact us for further details.
Course Content :
- What is a Cyber Risk Assessment?
- Why Perform a Cyber Risk Assessment?
- What is Risk?
- Risk Assessment Model
- How to Perform a Cyber Risk Assessment?
- Cybersecurity Frameworks
-
- NIST Cybersecurity Framework
- Cyber Assessment Framework
-
- Preparing an Incident Response Plan
For more information & In-House Training Email : forensics@orionforensics.com
- Payment is due upon registration
- Delegates who cancel after registration, or who don’t attend, are liable to pay the full course fee and no refunds can be given
- We reserve the right to postpone or cancel a training course at any time.
- If a training course is cancelled by us, we will inform all registered delegates on the course as soon as possible. Upon the cancellation of a course, we will offer to each delegate a full refund for the cost of the course or alternative dates for the course.
- We will not be held liable for any expenses, either direct or indirect, or for loss of time, earnings or business, incurred as a result of a postponed or cancelled course.
Read More

[Hands-on Workshop] Forensic Techniques for Auditors (1 DAY)
A one-day training course for auditors who wish to learn how to use basic forensic techniques to supplement their existing auditing processes. This is a hands on course with lots of practical exercises to demonstrate the learning points.
The candidates will learn basic forensic techniques to forensically extract and preserve data and how to correctly handle electronic evidence.
The candidates will also learn how to identify installed software, programs that have been executed on the system, extract historical information from system files and identify hidden user activity.
Course Level : The course is aimed at auditors who wish to learn how to use basic forensic techniques to supplement their existing audit processes. No previous experience is required.
Who Should Attend : IT Auditor
Date & Time : Due to COVID this course is currently being run as an online course. Please contact us for further details.
Course content
- Define Digital Forensics
- Legal Consideration
- Evidence Handling & Chain of Custody
- How Courts Assess the Integrity of Digital Evidence
- Good Practice Guidelines for Digital Evidence
- The Four Principles of Computer Based Evidence
- Forensic Acquisitions
- Windows Registry
- Identifying Installed Software
- Volume Shadow Copies
- Identifying Executed Programs
- Link File Analysis
- USB Forensics
- Searching the Registry
- Event Logs
- Summary
For more information & In-House Training Email : forensics@orionforensics.com
Cancellation Policy
- Payment is due upon registration
- Delegates who cancel after registration, or who don’t attend, are liable to pay the full course fee and no refunds can be given
- We reserve the right to postpone or cancel a training course at any time.
- If a training course is cancelled by us, we will inform all registered delegates on the course as soon as possible. Upon the cancellation of a course, we will offer to each delegate a full refund for the cost of the course or alternative dates for the course.
- We will not be held liable for any expenses, either direct or indirect, or for loss of time, earnings or business, incurred as a result of a postponed or cancelled course.
Read More

Digital Forensics Foundation Training Course 4 Days
A 4 day practical training course for people who are responsible for digital forensic investigations or are wishing to become a digital forensic investigator. The course will provide a solid foundation in the understanding of digital forensics principles and techniques. Each subject is covered in depth and supported by practical scenario based exercises to reinforce the learning points. The candidate will use a range of free and open source forensic tools. This allows the candidate the opportunity to practice what they have learnt on the course without the need to invest in expensive forensic software / hardware. The course has been designed by experienced forensic investigators with many years’ experience ensuring the course content is both relevant and practical.
Read More
Digital Evidence – Unlocking the Secrets Course
A one day training course for legal professionals who have to deal with digital evidence. The course will look at the types of digital evidence that is routinely produced for legal proceedings and the potential issues surrounding that evidence . The course will provide an overview of the forensic principles, techniques and terminology used by forensic investigators. The aim is to provide the candidate with a level of understanding so they can interpret forensic reports and assess the authenticity and integrity of the digital evidence. A reference manual will be provided to each candidate along with a certificate of completion confirming the number of training hours undertaken.
Read More
Training For IT Staff – Computer Forensics Awareness and Incident Response Training
A one day training course aimed at IT staff that may have to deal with cyber security threats. The course will provide the candidate with an explanation of what is computer forensics and the techniques regularly employed by computer forensic investigators.
The candidate will be trained how to respond to cyber security threats and how to preserve the electronic data in an evidentially sound manner using a basic forensic tool.
Aim of the Course:
The aim of the course is to provide the candidate with an explanation of what is computer forensics, the issues in obtaining computer evidence and the forensic techniques regularly employed by forensic investigator. The aim is to provide the candidate with the knowledge to prepare a cyber-security incident response plan and training in using a basic forensic tool to preserve the digital data in an evidentially sound manner.
Course Level:
The course is aimed at IT teams , Incident Response Team (IR) that have no knowledge or limited knowledge in relation to computer forensics and computer forensics techniques.
Who Should Attend:
IT professionals who may be required to collect and preserve electronic data that could later be used as evidence in legal proceedings. IT managers who may be responsible for overseeing the collection and preservation of electronic data.
Onsite Training :
- In-House Training Only.
- Daily Rate Charge.
- Maximum candidate in the class 5-10 or more please discuss with sales directly .
Course content
• Introduction
• Cyber Threats 2020
• Economic Crime Thailand 2019
• Define Digital Forensics
• Legal Consideration
• Evidence Handling & Chain of Custody
• Why is Digital Forensics Important to your Organisation
• Good Practice Guidelines for Computer Based Evidence
• Forensic Acquisitions
• Forensic Acquisition Tools
• Hash Values (Digital Fingerprint)
• Persistent Vs Volatile Data
• Dealing with Live systems
• Dealing with Servers
• Capturing RAM Memory
• How to Perform Bulk Forensic Imaging
• Creating an East2Boot Bootable Hard Drive
• Preparing an Incident Response Plan
For more information & In-House Training Email : forensics@orionforensics.com
Cancellation Policy
- Payment is due upon registration
- Delegates who cancel after registration, or who don’t attend, are liable to pay the full course fee and no refunds can be given
- We reserve the right to postpone or cancel a training course at any time.
- If a training course is cancelled by us, we will inform all registered delegates on the course as soon as possible. Upon the cancellation of a course, we will offer to each delegate a full refund for the cost of the course or alternative dates for the course.
- We will not be held liable for any expenses, either direct or indirect, or for loss of time, earnings or business, incurred as a result of a postponed or cancelled course.