Course details

This unit (comprising 2 sets of competencies) describes the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization.

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X , Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics.

COURSE STRUCTURE

Security Fundamentals

  • The Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

Identifying Security Threats And Vulnerabilities

  • Social Engineering
  • Malware
  • Software-Based Threats
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities

Managing Data, Application, And Host Security

  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security

Implementing Network Security

  • Configure Security Parameters on Network Devices and Technologies
  • Network design Elements and Components
  • Implement Networking Protocols and Services
  • Apply Secure Network Administration Principles
  • Secure Wireless Traffic

Implementing Access Control, Authentication, And Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

Managing Certificates

  • Install a CA Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Back-Up and Restore Certificates and Private Keys
  • Revoke Certificates

Implementing Compliance And Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training
  • Integrate Systems and Data with Third Parties

Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

Troubleshooting And Managing Security Incidents

  • Respond to Security Incidents
  • Recover from a Security Incident

Business Continuity And Disaster Recovery Planning

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute DRPs and Procedures
Updated on 03 September, 2016

About ITBM

Instructional & Courseware Design

  • Customized CD Learning, e-Learning and Courseware for companies. Find out more now.

Office Workflow Automation

  • When running your day-to-day business, you realise that things can be made easier for you if the system is computerised. But how do you get started? More information here.
See all ITBM courses
Are you from ITBM ? Claim your course!

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or