SECO - IT-Security Foundation 2 Days Training in Miami, FL
Other
7900 Oak Lane,Miami Lakes FL 33016
20 May, 2021
Description
Our classroom training provides you the opportunity to interact with instructors and benefit from face-to-face instruction. Course Description: The IT-Security Foundation course is a two-day course aimed at developing basic knowledge about securing and defending an IT infrastructure environment. The slides cover all examination topics; no additional literature is required to prepare students for the exam. Course Outline: Day 1 Introduction to IT-Security FoundationLearning objectivesSecurity in Networks, Systems and SoftwareUnderstanding the different types of computer systems and their vulnerabilities from a security point of viewUnderstanding TCP/IP networkingIP and IPV4 security, Wi-Fi and attacks on networksRelevance of understanding applications and application vulnerabilities Day 2 Security in Networks, Systems and SoftwareUnderstanding databases and database vulnerabilitiesSecurity through Cryptography and Access ControlUnderstanding cryptography in terms of implementing effective security measuresDefinition of identification and examples of identity attributesCommon (Ab)use CasesUnderstanding cloud computing and the related risksUnderstanding how cyber criminals exploit vulnerabilities to be able to implement appropriate security controlsSummary of all modulesRefer to Summary / Recapitulation activitiesTarget Audience: Managers who wish to understand more clearly what is required from security specialists without engaging in technical details, andProfessionals who wish to attend further specialised security training in the futureLearning Objectives: The course provides candidates with an overview of the most important technological aspects of an IT infrastructure. The main aim of the course is to help candidates acquire a global understanding of the security impact of each of these technological aspects. Course Agenda: The course consists of three modules: Module 1: Security in Networks, Systems and SoftwareModule 2: Security through Cryptography and Access ControlModule 3: Common (Ab)use Cases
Discussion
By posting you agree to the Terms and Privacy Policy.