Fundamentals of Information Security Training

Fundamentals of Information Security Training

Introduction:

Fundamentals of Information Security Training course project-based

In this Fundamentals of Information Security Training course, you will learn about new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. With Fundamentals of Information Security Training, you will also be provided with a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. You will also be given additional material on information security standards, education, professional certifications, and compliance laws.

In addition to premium instructional content from Jones & Bartlett Learning's comprehensive Information Systems Security and Assurance (ISSA) curriculum, this Fundamentals of Information Security Training course provides access to a customized "virtual sandbox" learning environment that aggregates an unparalleled spectrum of cybersecurity applications. Providing instant, unscheduled access to labs from the convenience of a web-browser, this course allows you to practice "white hat" hacking on a real IT infrastructure-these are not simulations. Winner of the "Security Training and Educational Programs" top prize at the prestigious 2013 Global Excellence Awards by Info Security Products Guide, the industry's leading information security research and advisory guide, these labs provide valuable exposure to complex, real world challenges and over 200 hours of training exercises on how hackers and perpetrators use these applications and tools.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

Information security analysts
Payroll specialists
IT infrastructure security specialists
People who decide which information technology and cybersecurity products to acquire for their organization

Fundamentals of Information Security TrainingRelated Courses:

Duration: 5 days

Skilled Gained:

Concepts of information systems security as applied to an IT infrastructure
How malicious attacks, threats, and vulnerabilities impact an IT infrastructure
Access controls in implementing a security policy
Operations and administration in effective implementation of security policy
Security audits, testing, and monitoring to effective security policy
Risk management, common response techniques, and issues related to recovery of IT systems
How businesses apply cryptography in maintaining information security
Network principles and architecture to security operations
Ways attackers use to compromise systems and networks and defenses used by organizations
Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector

Course Content:

Lab 1: Perform Reconnaissance and Probing Using ZenMap GUI (Nmap)
Lab 2: Perform a Vulnerability Assessment Scan Using Nessus
Lab 3: Enable Windows Active Directory and User Access Controls
Lab 4: Configure Group Policy Objects and Microsoft Baseline Security Analyzer
Lab 5: Perform Protocol Capture and Analysis Using Wireshark and Netwitness Investigator
Lab 6: Perform Business Continuity Plan Implementation Planning
Lab 7: Relate Windows Encryption and Hashing to Confidentiality and Integrity
Lab 8: Perform a Website and Database Attack by Exploiting Identified Vulnerabilities
Lab 9: Perform a Virus Scan and Malware Identification Scan and Eliminate Threats
Lab 10: Craft an Information Systems Security Policy

2014-05-14 11:02:07.427000000
Lab 8: Perform a Website and Database Attack by Exploiting Identified Vulnerabilities
Lab 9: Perform a Virus Scan and Malware Identification Scan and Eliminate Threats
Lab 10: Craft an Information Systems Security Policy

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment