| Code | Date | City | Fees | Register |
|---|---|---|---|---|
| IS004 | April 5, 2026 - April 16, 2026 | Barcelona | $ 9900 |
Register Course.. |
| IS004 | July 19, 2026 - July 23, 2026 | Dubai – UAE | $ 5300 |
Register Course.. |
| IS004 | October 4, 2026 - October 15, 2026 | Sharm El-Sheikh | $ 8900 |
Register Course.. |
| IS004 | January 17, 2027 - January 21, 2027 | Singapore | $ 6100 |
Register Course.. |
________________________________________________________________________________________________
Objectives
- This course will help participants to:
- Describe the components of survivability
- Identify and define the components of an information security (is) model
- Describe the components of risk and asset management as applied to networked systems
- Identify the benefits of invoking sound security policies and methods for implementing them
- Describe the steps of the security knowledge in practice(skip) methodology
- Summarize key security concerns of the tcp/ip protocol suite
- Describe the benefits of cryptography when applied to is properties of confidentiality, integrity, and availability
- Describe common methods of gathering information on networked systems
- Describe the types of current vulnerabilities and threats to which an organization’s information assets may be exposed
- Identify common attack methods perpetrated against network systems
- Describe best practices for hardening and actively defending host and networked systems from intrusions
- Develop an approach for staying current with trends and requisite skills in information security
The Delegates
- Technical staff members who manage or support networked information systems and have :
- Two years of practical experience with networked systems or equivalent training/education
- Some degree of specific familiarity with the iso/osi 7-layered reference model as well as ethernet, tcp/ip, and major network operating systems such as windows nt/2000/xp and unix .
The Contents
- The Challenge Of Survivability
- Asset And Risk Management
- Policy Formulation And Implementation
- Security Knowledge In Practice
- Tcp/Ip Security
- Cryptography
- Prelude To A Hack (Information Gathering)
- Threats, Vulnerabilities, And Attacks
- Host System Hardening
- Securing Network Infrastructure
- Deploying Firewalls
- Securing Remote Access
- Intrusion Detection Systems
- Course Summary.
The Discount
10% in case of Three P. (or more)