Event Details
To teach participants the best way to computer security, vulnerability analysis and control
CONTENT:
Securing Information
· Implement physical security measures
· Site location
· Cyber security
· Equipment protection
Information Security and risk management
· Risk management
· Security awareness
· Information security management
Guarding Against Attacks
· Security threats
· Virus attacks
· Social network threats
Handling Security Breaks
· Identifying incidents
· Respond to incidents
Identifying Cloud Computing and Virtualization Security Methods
· Fundamentals of cloud computing
· Fundamentals of virtualization Access control
· Access control threats
· Access to systems/ data
· Access control Technologies
· Assurance mechanism
Vulnerability analysis
· Scanning
· Password cracking
· Programming survival skills
· Exploit basics
FOR WHOM:
Network Administrators, System Administrators/Engineers, IT Professionals and Technical staff that want to sharpen their network, security and troubleshooting skills.
TRAINING METHODOLOGY
The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.