The Definitive IT Security Awareness Boot Camp
(SECAWARE, Live Instructor-Led Training, 2 days)


This SETC certified course introduced IT and business professionals to the many concepts and technologies that are at the heart of IT security. Most security professionals agree that corporate IT systems are more at risk today than they have ever been. The availability of information and the increased appetite for information and data requires organizations to expose their systems more and more to the vagaries of public consumption. This level of access means that an increasing number of people can compromise corporate data and IT infrastructure. Therefore, it is more important than ever for all employees to have a good understanding of the concepts and technologies that allow enforcement of the organization’s security policy. Why take the risk? Familiarize yourself and your staff with the many IT security concepts and technologies that protect you every day. (Note: This course is also available in a 1 day format).

Dates and Pricing

Jan 29 to Jan 30, 2018$1,150/person Feb 26 to Feb 27, 2018$1,150/person Mar 26 to Mar 27, 2018$1,150/person


Exploring the Security Landscape
What is computer security
Terms and concepts
Risk management
Security standards
Understanding the different certifications
The Human Factor
Understanding the Human Factor
Defining sound policies
CIA: Confidentiality, Integrity and Availability
The System
Planning for Security
Integrating Security in System Lifecycles
Controlling information flow
Overview of Cryptography
Authentication and Authorization
Single-vendor vs. mixed-vendor solutions
Physical vs. Logical security
workstation Security
Defining desktop security
Understanding desktop security
Integrating diverse desktop
Exploring security threats
server Security
Defining server security
Understanding Windows Security
Understanding Unix and Linux Security
Software Service Security
Defining software service
Daemons and services
Process and privileges
Process isolation
Network Security
Securing the network
Understanding networking
Overview of TCP/IP
Routing and Firewalls
Web Security
Understanding Web Security
Web Browsers and Cookies
How HTTP sessions are maintained
Email security
Infrastructure Security
Defining Infrastructure
Controlling physical access
Vector of Attack
Thinking like a cracker
Tools of the Trade
Testing Security
Demonstrating an attack
The role of the Security Officer