Training IT Security - BBM TRAINING AND CONSULTING

Training Terbaru

Jadwal Training 2020

Start Date

Duration

Registrasion Form

06 January 2020

1/2/3/5 Days

Registration Form Link

06 January 2020

1/2/3/5 Days

Registration Form Link

03 February 2020

1/2/3/5 Days

Registration Form Link

02 March 2020

1/2/3/5 Days

Registration Form Link

27 April 2020

1/2/3/5 Days

Registration Form Link

18 May 2020

1/2/3/5 Days

Registration Form Link

22 June 2020

1/2/3/5 Days

Registration Form Link

20 July 2020

1/2/3/5 Days

Registration Form Link

17 August 2020

1/2/3/5 Days

Registration Form Link

14 September 2020

1/2/3/5 Days

Registration Form Link

12 October 2020

1/2/3/5 Days

Registration Form Link

09 November 2020

1/2/3/5 Days

Registration Form Link

01 December 2020

1/2/3/5 Days

Registration Form Link

Training IT Security

Training IT Security

INTRODUCTION
After taking this course, participants will understand the field of network security and how it relates to other areas of information technology. They will implement and monitor security on networks, applications, and operating systems, and respond to security breaches. This course provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field
PROGRAM OBJECTIVES

  • Understanding the fundamental concepts of computer security
  • Being able to identify security threats and vulnerabilities
  • Learning how to manage application, data and host security
  • Identifying access control and account management security measures
  • Learning how to manage security incidents
  • Being familiar with developing business continuity and disaster recovery plans

WHO SHOULD ATTEND?

  • IT managers
  • Network administrators
  • Database administrators
  • Anyone who deal directly or indirectly with IT

PROGRAM OUTLINE
  • Introduction to IT security
  • Information security cycle
  • Information security controls
  • Authentication methods
  • Cryptography fundamentals
  • Security threats and vulnerabilities
  • Network devices and technologies
  • Apply network security administration principles
  • Managing application, data and host security
  • Ethical Hacking
  • Intelligence Gathering
  • Scanning and enumerating resources
  • Implement vulnerability assessment tools and techniques
  • Mitigation and deterrent techniques
  • Respond to security incidents
  • Recover from a security incident
  • Business continuity
  • Initiating remote shells
  • Pilfering target information
  • Uploading and executing payloads

Permintaan Brosur penawaran Training

( Harga, Waktu dan Tempat)

silahkan Menghubungi kami.

Cs1 : +62812 2554 2418

Cs2 : +62857 2459 5005





Form Request Training