NICF – Certified Security Analyst ITBM
Price: AED 9,370

    Course details

    This unit (comprising 2 sets of competencies) describes the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization.

    This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X , Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics.

    COURSE STRUCTURE

    Security Fundamentals

    • The Information Security Cycle
    • Information Security Controls
    • Authentication Methods
    • Cryptography Fundamentals
    • Security Policy Fundamentals

    Identifying Security Threats And Vulnerabilities

    • Social Engineering
    • Malware
    • Software-Based Threats
    • Network-Based Threats
    • Wireless Threats and Vulnerabilities
    • Physical Threats and Vulnerabilities

    Managing Data, Application, And Host Security

    • Manage Data Security
    • Manage Application Security
    • Manage Device and Host Security
    • Manage Mobile Security

    Implementing Network Security

    • Configure Security Parameters on Network Devices and Technologies
    • Network design Elements and Components
    • Implement Networking Protocols and Services
    • Apply Secure Network Administration Principles
    • Secure Wireless Traffic

    Implementing Access Control, Authentication, And Account Management

    • Access Control and Authentication Services
    • Implement Account Management Security Controls

    Managing Certificates

    • Install a CA Hierarchy
    • Enroll Certificates
    • Secure Network Traffic by Using Certificates
    • Renew Certificates
    • Back-Up and Restore Certificates and Private Keys
    • Revoke Certificates

    Implementing Compliance And Operational Security

    • Physical Security
    • Legal Compliance
    • Security Awareness and Training
    • Integrate Systems and Data with Third Parties

    Risk Management

    • Risk Analysis
    • Implement Vulnerability Assessment Tools and Techniques
    • Scan for Vulnerabilities
    • Mitigation and Deterrent Techniques

    Troubleshooting And Managing Security Incidents

    • Respond to Security Incidents
    • Recover from a Security Incident

    Business Continuity And Disaster Recovery Planning

    • Business Continuity
    • Plan for Disaster Recovery
    • Execute DRPs and Procedures
    Updated on 03 September, 2016

    About ITBM

    Instructional & Courseware Design

    • Customized CD Learning, e-Learning and Courseware for companies. Find out more now.

    Office Workflow Automation

    • When running your day-to-day business, you realise that things can be made easier for you if the system is computerised. But how do you get started? More information here.
    See all ITBM courses
    Are you from ITBM ? Claim your course!

    Is this the right course for you?

    Rate this page

    Didn't find what you were looking for ?

    or