Information Security Fundamentals

Level:
Costs:
Total time:
Provider rating: 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)
Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course Information Security Fundamentals at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
5 Days
Location type:
Open

vat information, completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

Previous knowledge and use of the Internet is essential, particularly awareness of TCP/IP and standard Internet services such as the World Wide Web, e-mail and DNS. This knowledge can be gained by attending either the course or the

The course requires an understanding of Microsoft Windows operating systems; and familiarity with Linux would be an advantage.

Course Description:

This 5-day instructor-led course serves as an in depth introduction to the field of Information Security – it is not aligned to a specific examination or vendor accreditation and therefore the content can be updated on a regular basis.

This course is designed for IT professionals and technical managers who w…

Read the complete description

Description

Prerequisites:

Previous knowledge and use of the Internet is essential, particularly awareness of TCP/IP and standard Internet services such as the World Wide Web, e-mail and DNS. This knowledge can be gained by attending either the course or the

The course requires an understanding of Microsoft Windows operating systems; and familiarity with Linux would be an advantage.

Course Description:

This 5-day instructor-led course serves as an in depth introduction to the field of Information Security – it is not aligned to a specific examination or vendor accreditation and therefore the content can be updated on a regular basis.

This course is designed for IT professionals and technical managers who want to understand key IT security issues and how best to address them. The course will also be of benefit to IT systems analysts, designers and software developers.

Delegates will learn how to:

  • Understand the IT security threats faced by a modern network
  • Understand the techniques used to mitigate these threats
  • Respond to IT security incidents
  • Understand IT security policies
  • Understand cryptography and its uses
  • Understand authentication mechanisms
  • Understand the importance of physical security
  • Understand the compliance and legal requirements of an organisation

This course includes the following modules:

Introduction to Information Security

  • Information Security fundamentals
  • Information Security models
  • IS standards
  • Attack overviews

Risk Management

  • Risk management process
  • Risk analysis
  • Risk control

Operating System Security

  • Popular operating systems
  • OS hardening
  • Vulnerabilities and the patch cycle
  • OS scanning

Access Control

  • Types of access control
  • Physical access
  • Controlling resource access
  • Microsoft Windows NTFS
  • Linux ext3/4
  • Cloud security

Encryption

  • Introduction to cryptography
  • Hashing
  • Encrypting stored data
  • Digital signatures
  • Public Key Infrastructure (PKI)
  • Encrypting network data
  • Transport Layer Security
  • Virtual private networks

Authentication

  • Authentication mechanisms
  • Good password strategies
  • Microsoft Windows Kerberos
  • Attacking Windows authentication
  • Linux authentication mechanisms
  • Certificate-based authentication
  • Biometric authentication

Legal Compliance & Security Policies

  • UK legal regulations
  • The role of security policies
  • Writing security policies
  • Ensuring business continuity

Application Security

  • General guidelines for application security
  • Securing web applications
  • Securing mail applications
  • securing databases

Malware

  • Types of malware
  • Malware detection
  • Malware removal
  • Trojans
  • Rootkits
  • Botnets
  • Spam delivery

Perimeter Security

  • Network designs
  • Mobile workers
  • Firewalls
  • Proxy servers

Attacking TCP/IP

  • Weaknesses in TCP/IP
  • Securing network devices
  • IPSec
  • Network Intrusion Detection
  • SNORT

Wireless Network Security

  • Introduction to wireless networking
  • Problems with WEP
  • WPA2
  • Mobile IP

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

In-company offer

Ask for a quote on a customised training course.
Maximum 3 relevant providers will directly respond.

More courses within this subject:

Compare 36,062 training courses in subjects like IT Security

Subscribe to our newsletter?

Receive news, tips, articles, interviews and education on personal development each month.

Sign up to create your own Learning Lists.

Not for humans