Training IT Security
INTRODUCTION
PROGRAM OBJECTIVES
- Understanding the fundamental concepts of computer security
- Being able to identify security threats and vulnerabilities
- Learning how to manage application, data and host security
- Identifying access control and account management security measures
- Learning how to manage security incidents
- Being familiar with developing business continuity and disaster recovery plans
- Understanding the fundamental concepts of computer security
- Being able to identify security threats and vulnerabilities
- Learning how to manage application, data and host security
- Identifying access control and account management security measures
- Learning how to manage security incidents
- Being familiar with developing business continuity and disaster recovery plans
WHO SHOULD ATTEND?
- IT managers
- Network administrators
- Database administrators
- Anyone who deal directly or indirectly with IT
PROGRAM OUTLINE
- Introduction to IT security
- Information security cycle
- Information security controls
- Authentication methods
- Cryptography fundamentals
- Security threats and vulnerabilities
- Network devices and technologies
- Apply network security administration principles
- Managing application, data and host security
- Ethical Hacking
- Intelligence Gathering
- Scanning and enumerating resources
- Implement vulnerability assessment tools and techniques
- Mitigation and deterrent techniques
- Respond to security incidents
- Recover from a security incident
- Business continuity
- Initiating remote shells
- Pilfering target information
- Uploading and executing payloads