This five-day course provides a managerial perspective of contemporary computer and network security issues. The course gives learners the knowledge to design, implement, and maintain a network security plan that successfully defends a network from malicious or accidental intrusion.
After completing this course, learners should be able to:
- Explain the concepts of information systems security as applied to an IT infrastructure
- Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure
- Explain the importance of critical contributors to the effective implementation of security policy, such as access controls, operations, administration, security audits, testing, and monitoring
- Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems
- Explain how businesses use cryptography to maintain information security
- Analyze why network principles and architecture are important to security operations
- Explain how attackers compromise systems, and what networks and defenses are used by organizations
- Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector
Who should attend
Governance, risk, compliance, and IT professionals, as well as anyone else who wants to understand how cyber security relates to their profession.
A working understanding of basic information security principles is a plus, but not required.
In-classroom instructor-led training