Baltimore, Maryland, USA
9:00 AM – 5:00 PM (EST)
info@aaconsulting.tech
+1 443 253 0203
Baridhara, Dhaka-1212, Bangladesh
10:00 AM – 6:00 PM (BDT)
info@aaconsultingtech.com
+8802 2266 16261

Our Trainings

Cyber Training.

BASIS has organized a Cyber trains an organization's employees on how to protect the organization.

Cyber ​​security trains an organization's employees on how to protect the organization. In addition, the panelists provided ideas on how an organization can gain informational and financial benefits through cyber technology. Representatives of 30 companies attended the seminar.

Digital Security Standing Committee was held at BASIS Auditorium. Shahzeb Ibn Hussain, Managing Director of Data Park BD Limited, read the main article in the seminar. Apart from this, BugsBD Limited Managing Director Delwar Alam gave a speech.

Seminar on Cybersecurity

Seminar on Cybersecurity posture and policy guidelines in Bangladesh.

The term ‘Cybersecurity posture and policy guidelines’ is considered a ‘living document’, and it is mainly the practice of protecting systems, networks, and programs from digital attacks. Bangladesh’s cyber security policies became well known internationally in 2016 when the country’s central bank was the subject of one of the largest digital bank heists to date, where about US$101 million was stolen from the Bangladesh Bank’s account with the New York Federal Reserve Bank by hackers (The Daily Star, 2016). read more

Training on "Endpoint Security"

A significant number of BASIS member companies were also present at the seminar. Participants actively participated in the question-answer session and clarified their concerns.

the back of random person
an eagle
a cup of something to drink, probably some tea

Training on "Cyber Security"

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security.

the back of random person
an eagle
a cup of something to drink, probably some tea

IT Security Training

A session to learn how to secure the Enterprise System.

Cybersecurity is a growing concern in today's digital world. Protecting company’s data and sensitive information has never been more important. Data breaches and cyber-attacks are on the rise, costing individuals and businesses millions of dollars every year. Don't wait until it's too late. Invest in your cybersecurity knowledge and skills today.

Security Training

Requirements and Security Assessment include:

~ Building and maintaining a secure network.

~ Protecting cardholder data .

~ Maintaining a vulnerability management program.

~ Implementing strong access control measures

~ Regularly monitoring and testing networ .ks

~ Maintaining an information security policy .

Cyber Security Based on ISO:

~ Introduction as to what is information security and security in general.

~ Security Policy .

~ Risk Assessment and Treatment

~ Implementing strong access control measures .

~ and more (find out more in the tabs below)

Management: responsibility for assets and information classification

Human Resources Security: prior to employment, during employment, and termination or change of employment Physical and Environmental Security: secure areas and equipment security.

This consists of:

~ Operational procedures and responsibilities.

~ Third party service delivery management .

~ System planning and acceptance

~ Protection against malicious ad mobile code.

~ Back-up

~ Network security management

~ Media handling

~ Exchange of information

~ Electronic commerce services

~ Monitoring.

This consists of:

~ Business requirement for access control .

~ User access management and responsibilities .

~ Network access control.

~ Operating system access control.

~ Application and information access control

~ Mobile computing and teleworking

~ Security requirements of information systems

~ Cryptographic controls.

~ Security of system files.

~ Security in development and support processes.

~ Technical vulnerability management .

This consists of:

~ Information Security Incident Management
~ Reporting information security events and weaknesses
~ Management of information security incidents and improvements.

~ Business Continuity Management
~ Information security aspects of business continuity management .

~ Compliance
~ Compliance with legal requirements
~ Compliance with security policies and standards, and technical
compliance ~ Information systems audit considerations