Security Professional Package

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

Master IT security techniques with this unique training package that contains both Cisco-specialist and vendor-neutral training materials. Students can learn a number of valuable practical skills that will help them carve out a career in the lucrativ...

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • IT Security
  • Security

Course programme

Master IT security techniques with this unique training package that contains both Cisco-specialist and vendor-neutral training materials. Students can learn a number of valuable practical skills that will help them carve out a career in the lucrative IT security market.

Focusing on modern enterprise computing security topics, this course package is best suited to:

  • Network security professionals who need to improve their skills and learn new techniques.
  • Security experts who need to achieve a recognised qualification as evidence of their skills.
  • Network engineers who want to improve their skills and employment options.
  • IT professionals looking to cross-train into IT security.
  • Private individuals who would like to acquire valuable skills that allow them to make a career change for a new role in network security.

Using a blend of instructor-led videos and vendor approved training materials, the Security Professional package is delivered online, ensuring contents are available anyplace anytime, as students need them. Learners can test their knowledge and understanding of each module using flash cards and educational games, whilst end of unit tests and quizzes ensure they have fully grasped each concept before moving on to the next module or course.

Students can also use the social networking platform also to share their real world knowledge and experience with other learners, creating a peer-to-peer problem solving and learning resource to complement their studies. Upon completion of the course students will not only have mastered the theories behind network security and Cisco network engineering, but they will also have learned the skills required to complete the certification exams associated with each course.

Key Learning Points

The Security Professional Package is made up of three separate courses designed to give students a complete understanding of network security, particularly where Cisco infrastructure is involved. Taking learners through the fundamentals of auditing, protecting and building network security systems, this course will ensure that they are fully prepared to face real world challenges in the corporate datacentre.

The package begins with the ISACA Certified Information Systems Auditor course which shows delegates:

  • The importance of applying information technology governance principles to maintain levels of security and system availability.
  • Defining and managing the information systems and infrastructure lifecycle to better plan and budget for upgrades and replacements.
  • Defining IT service delivery and support mechanisms and levels to ensure that systems and users remain online and issues are properly prioritised.
  • Identifying critical information assets and designing systems and processes to protect them from loss, theft or unauthorised access.
  • Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure.

The second course included in the bundle – the Certified Information Systems Security Professional – looks at:

  • The principles of secure access control and how they are applied to a network, keeping unauthorised users out of a system.
  • Telecommunications and network systems and devices that need to be secured against attack to prevent data loss or theft.
  • The role that information governance and risk management play in raising corporate security standards, and how they need to be applied to information systems.
  • The importance of security considerations during software architecture and design stages.
  • Using cryptography to protect data in transit and prevent unauthorised access of files without the correct decryption keys.
  • Using security architecture and design principles to limit data access and potential angles of attack.
  • Monitoring, auditing and improving operations security to keep systems secure at the point of access.
  • Designing and implementing business continuity and disaster recovery plans to help re-establish operations as quickly as possible following a serious outage.
  • Legal obligations of data security and obligations that must be fulfilled in the event of a criminal investigation.
  • Physical and environmental security considerations, like preventing theft of computer hardware or minimising fire risks.

The final course helps provide a vendor perspective using the Cisco CCNA + Security modules:

  • Using the Cisco Router SDM security audit feature to identify unauthorised network resource usage.
  • Locking down router security to prevent cybercriminals from gaining access to key network resources.
  • The Authentication, Authorisation and Accounting philosophy – keys to implementing corporate security solutions that actually work.
  • Using Access Control Lists to mitigate threats and minimise attack surfaces by limiting network access to authorised devices.
  • Implementing stateful firewalls using Cisco IOS to identify and block low level hacking attempts and malicious traffic.
  • Securing inter-site VPNs and data transfer using SDM on Cisco routers.
Advantages of this course

The Security Professional package helps students acquire the knowledge and practical skills they need to secure and manage a Cisco network using industry best-practice principles.

By completing the three courses contained in this unique package, learners will be ready to sit and pass the following qualifications:

  • ISACA Certified Information Systems Auditor (CISA).
  • Certified Information Systems Security Professional (CISSP).
  • Cisco Certified Network Architect (CCNA).

Other benefits include:

  • World-class, industry-leading practical skills that can be applied to any network engineering or security issue.
  • Up-to-date knowledge and skills that can be used to raise personal performance.
  • The ability to take on additional network management tasks and possible secure an internal promotion.
  • Improved employment options with newly acquired skills that are currently in high demand.

The Security Professional package is a cost-effective way to learn about improving network security in a Cisco environment. The unique blend of vendor neutral content coupled with Cisco-specific training means that skills can be used and applied anywhere – adding additional value in the form of portability.

  • Units of study
Certified Information Systems Auditor (CISA) Lesson 1
  • Introduction
  • Audit Process
  • Auditing Standards
  • Auditing Guidelines
  • Cobit Model
  • Audit Management
  • Internal Control Classifications
  • Planning
  • Program
  • Evidence
  • Audit Control Evaluation
  • C S A Control Self- Assessment
Lesson 2
  • IT Governance
  • Outsourcing And Governance
  • IT Security
  • Governance And Security Policies
  • Organizational Compliance
  • Outsourcing And Globalization
  • Outsourcing
  • IT Performance
Lesson 3
  • System and Infrastructure
  • Requirements
  • Project Management Tools- Part1
  • Project Management Tools- Part2
  • Applications
  • Agile Development
  • Monitoring And Controlling
  • Acquisition Process
  • Testing Process
  • Information Systems Maintenance Practices
  • Data Conversion Tools
Lesson 4
  • Media Disposal process
  • Post Implementation Review
  • Periodic Review
  • System Maintenance
Lesson 5
  • IT Service Delivery And Support
  • How To Evalutate Service Level Management Practices
  • Operations Management
  • Databases
  • Structured Query Language
  • Monitoring Performance
  • Source Code And Performance Monitoring
  • Patch Management
  • Incident Management
  • Hardware Component Types
  • Network Component Types
Lesson 6
  • I S Auditor Technical Overview
  • Security Design
  • Monitoring Systems
  • Types of Attacks
  • Cryptography
  • Encryption
  • Asymmetric Encryption
  • Digital Certificate
  • Different Kinds Of Attacks
  • Access Control
  • Identification And Authenication
  • Physical Access Exposure
  • Environmental Security
  • Network Security Devices And Network Components
  • Network Address Translation
  • Virtual Private Networks
  • Voice System Risks
  • Intrusion Detection
  • Firewalls
  • Firewall Implementation
  • Network Access Protection
  • Honey Pot
  • Risks To Portable And Wireless Devices
  • Bluetooth
  • OSI Networking
  • Managing Data
Lesson 7
  • Business Continuity And Disaster Recovery
  • Fault Tolerance
  • Business Continuity And Disaster Recovery Regulations
CISSP Module 1
  • Intro
  • Least Incorrect Answer
  • Ethics
Module 2
  • Accounts And Identity Management
  • Authentication Services
  • Categories And Types
  • Penetration Testing And Auditing
  • Systems M A C D A C R B A C
Module 3
  • Telecommunications
  • Wired Physical Interfaces
  • Physical Layer
  • Layer
  • Wireless
  • Wireless Lan
  • Layer34 And Firewalls
  • Firewalls
  • Protocols
  • Transport Layer
  • Layers5 And6
  • Presentation Layer
  • Layer7
  • Authentication
  • Printing
  • Messaging
  • Security Protocol
  • Application Attacks
  • Honeypots
  • Telecommunications
  • Voice Over I P
  • Attacks
  • VOIP Controls
Module 4
  • Layers of Protection
  • Penetration Testing
  • Vectors of Test
  • Scope
  • Technical Penetration Testing
  • Pen Testing Methodology
Module 5
  • Application Security
  • Connectivity Interfaces And Applications
  • Malware
  • Attack Types
  • Malformed Input
  • Payload
  • Web Risks
  • Insecure Direct Object Reference
  • Security Misconfiguration
  • How To Pass The Exam
  • Overview
  • Risk Management
  • Patch Management
  • Levels Of Patch Management
  • Software Development Life Cycle
  • Security
Module 6
  • Cryptography
  • Symmetric Vs Asymmetric
  • Managing Key Sizes
  • Initialization Vector
  • Asymmetric
  • Crytology Law
  • Message Integrity Controls
  • Apply Integrity Controls
  • Digital Signature Overview
  • Types of Encryption
  • Digital Signatures
  • Key Agreement
  • Hierarchical Trust Model
  • PGP And Digital Signatures
  • Spam Vs PKI
  • Cryptography and Stenography
  • Investigating For Steganography
  • Code Breaking
  • Common Cryptanalytical Attacks
  • Types of Attacks
Module 7
  • Common Criteria And Trusted Computing Base
  • Frameworks
  • Hardware
  • Software OS Design
Module 8
  • Data Classification
  • Data Backup and Control
  • Privilege Entry Control
  • I D S And IPS
Module 9
  • Business Continuity Planning
  • Policy And Program Management
  • Business Impact Analysis
  • Strategy Options
  • Incident Management Plans
  • Activity Response Plans
  • Test Plan
  • Embedding Business Continuity Plan
Module 10
  • Law Domain
  • Incident Handling
  • Legal Systems
  • Strategy Options
  • Intellectual Property
Module 11
  • Fire and Power
  • Perimeter Barrier Lock Sensor Guard
  • Physical Security Planning
  • Conclusion
CCNA and CCNA Security Bundle 100-101 Cisco ICND1 CCENT - Interconnecting Cisco Networking Devices Part 1
  • Introduction
  • Networking 101
  • OSI Model
  • Host To Host
  • Lans Switching 101
  • Lans Cabling Media
  • IOS Basics
  • Cisco Labs Bonus
  • Basic Switch Op
  • VLANS Trunking
  • Intro IPv4
  • VLSM
  • Intro Static Route
  • Ipv4 Upper
  • Access Control List
  • Intro Cisco Routers
  • Wan Connect
  • Nat Pat
  • Common Services
  • Securing Remote Access
  • Cisco Dynamic Routing
  • Cisco OSPF
  • Cisco IOS
  • Switching II
  • IPv6
  • Conclusion
200-101 Cisco ICND2 CCNA - Interconnecting Cisco Networking Devices Part 2
  • Introduction
  • Review Lab
  • Advanced Switching
  • VTP
  • VLAN Routing
  • Spanning Protocol
  • LAN Security
  • Layer 2 Redundancy
  • WAN Technology
  • WAN Connections
  • Frame Relay
  • HDLC PPP
  • RIPV2
  • RIPV2 II
  • Ether Channel
  • EIGRP
  • EIGRP Lab
  • OSPF
  • OSPF Lab
  • Layer 3 Redundancy
  • Layer 3 Redundancy Lab
  • Network Management
  • Network Management Lab
  • Outr
CCNA Security
  • Introduction
  • Network Security Basics I
  • Network Security Basics II
  • Securing Network Devices I
  • Securing Network Devices Lab I
  • IOS Enhancement Lab
  • Securing Network Devices II
  • Securing Network Devices Lab II
  • Using CCP To Configure SNMP Lab
  • Say Hello To AAA
  • Loacl AAA
  • Configuring Local AAA With CCP
  • Firewall Basics Using ACLs
  • Intro Firewall
  • Content Based Access Control Firewall
  • Zoned Based Firewalls
  • Zoned Based Firewalls Lab
  • Configuring Advanced Firewall With
  • Securing The LAN
  • Welcome to Cryptography
  • VPN
  • Remote Access VPNS
  • VPN Lab
  • Managing A Secure Network
  • Outro

Security Professional Package

Price on request