SETC Training844-434-7382
 Find a Course: 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

IT Security Training

The Teacher was very talented. As English is my second language, the teacher was able to understand what I was trying to say and answer easily all my questions.
Comment from DND

1. Title

  • Security Essentials for IT Professionals: A Complete Study (SECCOPM, 4 days)
    View PDF

2. Course Pre-requisites

  • Previous experience in secure IT environments

3. Target Audience

  • IT professionals who want to plan and implement IT security

4. Dates and Pricing

2 People for Guaranteed Live or Virtual Delivery $2,775.00 per person

5. Outline

Module 1: Essential Security Concepts

Topic 1: Understanding the Layers: Business, Information and Access Management

Topic 2: About Business Security Management

Topic 3: The Information Security Management Discipline

Topic 4: The Access Management Discipline

Topic 5: About ISM and Change Management

Topic 6: The Role of the Information Security Policy

Module 2: Threats and Vulnerabilities

Topic 1: Understanding the Topology of the Organization

Topic 2: IT Assets: Topology and Threats

Topic 3: The Anatomy of an Attack

Topic 4: About Privilege Escalation

Module 3: Common Attack Strategies

Topic 1: Understanding Network Communications: The Wired World

Topic 2: Understanding Network Communications: The Wireless World

Topic 3: Protecting Network Communications: Message Verification and Validation

Topic 4: Overview of Common Attack Strategies

Topic 5: Denial of Service Attacks

Topic 6: Eavesdropping, Spoofing and Sniffing

Topic 7: Trojan Horses and Viruses

Topic 8: Other Attack Strategies

Module 4: Understanding Cryptography

Topic 1: About Message Validation and Verification

Topic 2: The Basics of Cryptography: Keys and Algorithms

Topic 3: Choosing Key Lengths and Cryptographic Algorithms

Topic 4: Understanding Message Digests and Associated Algorithms

Topic 5: Understanding Public-Private Key Encryption and RSA

Topic 6: Working with SSL and Certificates

Topic 7: About the Certificate Authority: Choice and Use

Topic 8: About the use of a Digital Signature

Topic 9: Other Algorithms of Interest: BlowFish, PGP and More

Module 5: Creating and Implementing a Good Information Security Policy

Topic 1: The Typical Contents of an Information Security Policy

Topic 2: Communication the Policy

Topic 3: Creating and Implementing a Password Policy

Topic 4: About Password Strength and Expiration

Topic 5: Protecting against Social Engineering Attacks

Topic 6: About Encrypting Passwords

Topic 7: Using One Time and Tokenized Passwords

Topic 8: Understanding Multi-Factor Authentication: 2, 3, 4 and More

Module 6: IP Networking and Security

Topic 1: Understanding IPv4 and IPv6 Network Communications

Topic 2: About IP and its Vulnerabilities

Topic 3: Understanding the Logical and the Physical Topology of an IP Network

Topic 4: Understanding the Overall Network: the LAN and the WAN

Topic 5: Understanding and Protecting against MAC Based Attacks

Topic 6: Understanding and Protecting against DNS, DHCP, DFS and WINS Attacks

Topic 7: Understanding and Protecting against IIS Attacks

Module 7: Protecting IT Assets

Topic 1: The Tools of the Trade: Finding Vulnerabilities

Topic 2: Planning for Security Policy Implementation

Topic 3: Identifying Vulnerabilities in the Network and the Operating System

Topic 4: Restricting the Network: Rules and Firewalls

Topic 5: Restricting User Accounts: Locking Down Administrator and Service Accounts

Topic 6: Restricting User Accounts: The Password Policy

Topic 7: Restricting User Accounts: Creating Group Policy Objects

Topic 8: Locking Down Applications

Topic 9: Locking Down Local and Remote Files

Module 8: Preventing Against Common OS Attacks

Topic 1: Operating System Vulnerabilities

Topic 2: Using Firewalls and Security Policies

Topic 3: Making use of Cryptography and Protection Services

Topic 4: Dealing with Legacy Applications

Topic 5: Dealing with Java and .NET Applications

Topic 6: Preventing against Buffer Overflows

Topic 7: Preventing against Denial of Service Attacks

Topic 8: Making use of Event Logs

Topic 9: Making use of Network Sniffers

Module 9: A Complete Security Lab

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette