Code | Date | City | Fees | Register |
---|---|---|---|---|
IS004 | August 20, 2023 - August 24, 2023 | Dubai – UAE | USD 5100 |
Register Course.. |
IS004 | November 5, 2023 - November 9, 2023 | Istanbul | USD 5100 |
Register Course.. |
IS004 | February 18, 2024 - February 22, 2024 | Online | USD 1900 |
Register Course.. |
________________________________________________________________________________________________
Objectives
- This course will help participants to:
- Describe the components of survivability
- Identify and define the components of an information security (is) model
- Describe the components of risk and asset management as applied to networked systems
- Identify the benefits of invoking sound security policies and methods for implementing them
- Describe the steps of the security knowledge in practice(skip) methodology
- Summarize key security concerns of the tcp/ip protocol suite
- Describe the benefits of cryptography when applied to is properties of confidentiality, integrity, and availability
- Describe common methods of gathering information on networked systems
- Describe the types of current vulnerabilities and threats to which an organization’s information assets may be exposed
- Identify common attack methods perpetrated against network systems
- Describe best practices for hardening and actively defending host and networked systems from intrusions
- Develop an approach for staying current with trends and requisite skills in information security
The Delegates
- Technical staff members who manage or support networked information systems and have :
- Two years of practical experience with networked systems or equivalent training/education
- Some degree of specific familiarity with the iso/osi 7-layered reference model as well as ethernet, tcp/ip, and major network operating systems such as windows nt/2000/xp and unix .
The Contents
- The Challenge Of Survivability
- Asset And Risk Management
- Policy Formulation And Implementation
- Security Knowledge In Practice
- Tcp/Ip Security
- Cryptography
- Prelude To A Hack (Information Gathering)
- Threats, Vulnerabilities, And Attacks
- Host System Hardening
- Securing Network Infrastructure
- Deploying Firewalls
- Securing Remote Access
- Intrusion Detection Systems
- Course Summary.
The Discount
10% in case of Three P. (or more)