Sunteți pe pagina 1din 2

IT Security Fundamentals

Understanding IT security is essential for all organizations that rely on information


and the exchange of information to function effectively. Information security means
protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, perusal, inspection, recording or destruction.

The terms information security, computer security and information assurance are
frequently incorrectly used interchangeably. These fields are interrelated often and
share the common goals of protecting the confidentiality, integrity and availability
of information; however, there are some subtle differences between them.

The field of information security has grown and evolved significantly in recent years.
There are many ways of gaining entry into the field as a career. It offers many areas
for specialization including: securing network(s) and allied infrastructure, securing
applications and databases, security testing, information systems auditing, business
continuity planning and digital forensics science, etc.

The news is increasingly filled with stories of IT security attacks and new security
threats. In such a hostile environment filled with hackers, viruses, spyware and
spam organizations need systems and processes that provide a sufficient level of
network and computer system defenses. To do so requires internet security and
computer network security training.

You'll learn IT security management skills through hands-on exercises, interactive


case studies and relevant discussions with your peers and an experienced IT
security specialist.

How participants will benefit after the course

- Understand the IT security fundamental


- Understand the techniques used to mitigate these threats
- Understand IT security policies
- Understand authentication mechanisms
- Understand the importance of physical security
- Understand the network security
- Understand the Business Continuity
- Understand the confidentiality
- Understand the compliance and legal requirements of an organization
Contents of Training:

1st session: 9:00am - 10:45am


Introduction to Information Security
Information Security fundamentals
Information Security models
IS standards
IT risk management
Malware
2nd Session: 11:00am - 1:00pm
Access Control
Types of access control
Physical access
Controlling resource access
Microsoft Windows NTFS
Linux ext3/4
Cloud security
Case Study

3rd Session: 1:45pm - 3:30pm


Network Security
Gateway
Firewall / VPN
Remote Access
Endpoint security
Virtual security
Case Study

4th Session: 3:45pm - 5:30pm


Confidentiality
Compliance
Business Continuity
IT Security and Certifications

S-ar putea să vă placă și