Course details
This unit (comprising 2 sets of competencies) describes the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization.
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X , Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics.
COURSE STRUCTURE
Security Fundamentals
- The Information Security Cycle
- Information Security Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
Identifying Security Threats And Vulnerabilities
- Social Engineering
- Malware
- Software-Based Threats
- Network-Based Threats
- Wireless Threats and Vulnerabilities
- Physical Threats and Vulnerabilities
Managing Data, Application, And Host Security
- Manage Data Security
- Manage Application Security
- Manage Device and Host Security
- Manage Mobile Security
Implementing Network Security
- Configure Security Parameters on Network Devices and Technologies
- Network design Elements and Components
- Implement Networking Protocols and Services
- Apply Secure Network Administration Principles
- Secure Wireless Traffic
Implementing Access Control, Authentication, And Account Management
- Access Control and Authentication Services
- Implement Account Management Security Controls
Managing Certificates
- Install a CA Hierarchy
- Enroll Certificates
- Secure Network Traffic by Using Certificates
- Renew Certificates
- Back-Up and Restore Certificates and Private Keys
- Revoke Certificates
Implementing Compliance And Operational Security
- Physical Security
- Legal Compliance
- Security Awareness and Training
- Integrate Systems and Data with Third Parties
Risk Management
- Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
Troubleshooting And Managing Security Incidents
- Respond to Security Incidents
- Recover from a Security Incident
Business Continuity And Disaster Recovery Planning
- Business Continuity
- Plan for Disaster Recovery
- Execute DRPs and Procedures
Course Location
About ITBM
Instructional & Courseware Design
- Customized CD Learning, e-Learning and Courseware for companies. Find out more now.
Office Workflow Automation
- When running your day-to-day business, you realise that things can be made easier for you if the system is computerised. But how do you get started? More information here.