SETC Training844-434-7382
 Find a Course: 
 
Programming TrainingMicrosoft TrainingMS Office TrainingServer TrainingManagement TrainingNetwork TrainingAbout UsContact Us

IT Security Training


Good location and good computer setup so we can see the instructor s screen at our own desk computer. Front desk staff is very friendly. Nice training environment.
Comment from HRSDC

1. Title

  • Security Essentials for IT Professionals: A Complete Study (SECCOPM, 4 days)
    View PDF

2. Course Pre-requisites

  • Previous experience in secure IT environments

3. Target Audience

  • IT professionals who want to plan and implement IT security

4. Dates and Pricing


2 People for Guaranteed Live or Virtual Delivery $2,775.00 per person

5. Outline

Module 1: Essential Security Concepts

Topic 1: Understanding the Layers: Business, Information and Access Management

Topic 2: About Business Security Management

Topic 3: The Information Security Management Discipline

Topic 4: The Access Management Discipline

Topic 5: About ISM and Change Management

Topic 6: The Role of the Information Security Policy

Module 2: Threats and Vulnerabilities

Topic 1: Understanding the Topology of the Organization

Topic 2: IT Assets: Topology and Threats

Topic 3: The Anatomy of an Attack

Topic 4: About Privilege Escalation

Module 3: Common Attack Strategies

Topic 1: Understanding Network Communications: The Wired World

Topic 2: Understanding Network Communications: The Wireless World

Topic 3: Protecting Network Communications: Message Verification and Validation

Topic 4: Overview of Common Attack Strategies

Topic 5: Denial of Service Attacks

Topic 6: Eavesdropping, Spoofing and Sniffing

Topic 7: Trojan Horses and Viruses

Topic 8: Other Attack Strategies

Module 4: Understanding Cryptography

Topic 1: About Message Validation and Verification

Topic 2: The Basics of Cryptography: Keys and Algorithms

Topic 3: Choosing Key Lengths and Cryptographic Algorithms

Topic 4: Understanding Message Digests and Associated Algorithms

Topic 5: Understanding Public-Private Key Encryption and RSA

Topic 6: Working with SSL and Certificates

Topic 7: About the Certificate Authority: Choice and Use

Topic 8: About the use of a Digital Signature

Topic 9: Other Algorithms of Interest: BlowFish, PGP and More

Module 5: Creating and Implementing a Good Information Security Policy

Topic 1: The Typical Contents of an Information Security Policy

Topic 2: Communication the Policy

Topic 3: Creating and Implementing a Password Policy

Topic 4: About Password Strength and Expiration

Topic 5: Protecting against Social Engineering Attacks

Topic 6: About Encrypting Passwords

Topic 7: Using One Time and Tokenized Passwords

Topic 8: Understanding Multi-Factor Authentication: 2, 3, 4 and More

Module 6: IP Networking and Security

Topic 1: Understanding IPv4 and IPv6 Network Communications

Topic 2: About IP and its Vulnerabilities

Topic 3: Understanding the Logical and the Physical Topology of an IP Network

Topic 4: Understanding the Overall Network: the LAN and the WAN

Topic 5: Understanding and Protecting against MAC Based Attacks

Topic 6: Understanding and Protecting against DNS, DHCP, DFS and WINS Attacks

Topic 7: Understanding and Protecting against IIS Attacks

Module 7: Protecting IT Assets

Topic 1: The Tools of the Trade: Finding Vulnerabilities

Topic 2: Planning for Security Policy Implementation

Topic 3: Identifying Vulnerabilities in the Network and the Operating System

Topic 4: Restricting the Network: Rules and Firewalls

Topic 5: Restricting User Accounts: Locking Down Administrator and Service Accounts

Topic 6: Restricting User Accounts: The Password Policy

Topic 7: Restricting User Accounts: Creating Group Policy Objects

Topic 8: Locking Down Applications

Topic 9: Locking Down Local and Remote Files

Module 8: Preventing Against Common OS Attacks

Topic 1: Operating System Vulnerabilities

Topic 2: Using Firewalls and Security Policies

Topic 3: Making use of Cryptography and Protection Services

Topic 4: Dealing with Legacy Applications

Topic 5: Dealing with Java and .NET Applications

Topic 6: Preventing against Buffer Overflows

Topic 7: Preventing against Denial of Service Attacks

Topic 8: Making use of Event Logs

Topic 9: Making use of Network Sniffers

Module 9: A Complete Security Lab

SETC Training on LinkedIn follow @CTESTraining Follow us on Facebook
  Programming Training
  Microsoft Training
  Network Training
  Management Training
  Server Training
  Microsoft Office Training
Site developed and authored by Jean-Marc Choquette