Understanding IT security is essential for all organisations that rely on information and the exchange of information to function effectively. Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
The terms information security, computer security and information assurance are frequently incorrectly used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.
The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, etc.
The news is increasingly filled with stories of IT security attacks and new security threats. In such a hostile environment filled with hackers, viruses, spyware and spam organisations need systems and processes that provide a sufficient level of network and computer system defences. To do so requires internet security and computer network security training.
You’ll learn IT security management skills through hands-on exercises, interactive case studies and relevant discussions with your peers and an experienced IT security specialitst.
How participants will benefit after the course
- Understand the IT security fundamental
- Understand the techniques used to mitigate these threats
- Understand IT security policies
- Understand authentication mechanisms
- Understand the importance of physical security
- Understand the network security
- Understand the Business Continuity
- Understand the confidentiality
- Understand the compliance and legal requirements of an organisation
Workshop topics to be covered:
1st session: 9:00am - 10:45am
Introduction to Information Security
- Information Security fundamentals
- Information Security models
- IS standards
- IT risk management
2nd Session: 11:00am - 1:00pm
- Types of access control
- Physical access
- Controlling resource access
- Microsoft Windows NTFS
- Linux ext3/4
- Cloud security
- Case Study
3rd Session: 1:45pm - 3:30pm
---Firewall / VPN
- Endpoint security
- Virtual security
- Case Study
4th Session: 3:45pm - 5:30pm
- Business Continuity
- IT Security and Certifications