information security work shop
Work shop Objectives
- Describe the components of survivability.
- Identify and define the components of an information security (IS) model.
- Describe the components of risk and asset management as applied to networked systems.
- Identify the benefits of invoking sound security policies and methods for implementing them.
- Describe the steps of the Security Knowledge in Practice (SKiP) methodology.
- Summarize key security concerns of the TCP/IP protocol suite.
- Describe the benefits of cryptography when applied to IS properties of confidentiality, integrity, and
- Availability.
- Describe common methods of gathering information on networked systems.
- Describe the types of current vulnerabilities and threats to which an organization's information assets
- May be exposed.
- Identify common attack methods perpetrated against network systems.
Work shop content
- The challenge of survivability
- Asset and risk management
- Policy formulation and implementation
- Security Knowledge in Practice
- TCP/IP security
- Cryptography
- Prelude to a hack (information gathering)
- Threats, vulnerabilities, and attacks
- Host system hardening
- Securing network infrastructure
- Deploying firewalls
- Securing remote access
- Intrusion detection systems
- Windows and Unix host system hardening
- System availability monitoring
- Network access control techniques and applied encryption
- Secure network architectures and topologies
- Intrusion detection systems
- Secure implementation of logging and network monitoring
- Forensic analysis and incident response
Code |
Courses Title |
Date |
Venue |
Price |
Request |
IS21 |
information security work shop |
|