Information Security Fundamentals
Course
In London and Manchester
Description
-
Type
Course
-
Location
This 5-day instructor-led course serves as an in depth introduction to the field of Information Security - it is not aligned to a specific examination or vendor accreditation and therefore the content can be updated on a regular basis.
Facilities
Location
Start date
Start date
Start date
Reviews
Subjects
- IT
- Security
- IT Security
Course programme
- Information Security fundamentals
- Information Security models
- IS standards
- Attack overviews
- Risk management process
- Risk analysis
- Risk control
- Popular operating systems
- OS hardening
- Vulnerabilities and the patch cycle
- OS scanning
- Types of access control
- Physical access
- Controlling resource access
- Microsoft Windows NTFS
- Linux ext3/4
- Cloud security
- Introduction to cryptography
- Hashing
- Encrypting stored data
- Digital signatures
- Public Key Infrastructure (PKI)
- Encrypting network data
- Transport Layer Security
- Virtual private networks
- Authentication mechanisms
- Good password strategies
- Microsoft Windows Kerberos
- Attacking Windows authentication
- Linux authentication mechanisms
- Certificate-based authentication
- Biometric authentication
- UK legal regulations
- The role of security policies
- Writing security policies
- Ensuring business continuity
- General guidelines for application security
- Securing web applications
- Securing mail applications
- Securing databases
- Types of malware
- Malware detection
- Malware removal
- Trojans
- Rootkits
- Botnets
- Spam delivery
- Network designs
- Mobile workers
- Firewalls
- Proxy servers
- Weaknesses in TCP/IP
- Securing network devices
- IPSec
- Network Intrusion Detection
- SNORT
- Introduction to wireless networking
- Problems with WEP
- WPA2
- Mobile IP
Information Security Fundamentals