Security Training Programs
|
|
|
- Lizbeth Norris
- 9 years ago
- Views:
Transcription
1 Security Training Programs.
2 Overview According to numerous sources, nothing in the information security arena brings a better return on investment (ROI) than security training and awareness. Emagined Security offers organizations a variety of on- and offsite training opportunities. These include an offering of a wide range of standard courses such as Responding to Incidents and Forensics, Windows 2008 Security, Unix Security, Linux Security Hands-on, Securing IIS Web Servers, Securing Apache Web Servers, Intrusion Detection and Prevention, Network Security, Information Security Basics, Cryptography, Mobile Computing Security, and Certification Examination Preparation Courses (the CISM and CISSP Prep Courses). Benefits Emagined Security s courses cover most critical knowledge and skill areas within information security. These courses are designed to enable attendees to gain and apply state-of-the-art, indepth knowledge of critical concepts and issues in information security and assurance. Wherever possible, attendees are given the opportunity to gain hands-on experience with configuration tasks, analysis of critical information such as intrusion detection-related data, and scripting. Emagined Security s instructors are well known, respected professionals within the security community who have depth of experience in the areas they cover. Instructors are regular presenters at major security conferences and are high-rated, experienced instructors who know how to motivate attendees to learn and help attendees learn at various levels that go well beyond rote knowledge. Our instructors provide many case studies and share a wide range real world experiences, thus making our training courses more meaningful, applicable and enjoyable. Several Emagined instructors have won teaching and speaking awards. Emagined Security teaches courses that are available to the public, but we can also bring training to you. Our instructors can travel to your site, so you don t have to send the entire class to an offsite location, thus saving your organization time and money. Another distinctive of Emagined Security s training is the number and quality of materials provided to attendees. Handouts list bullets that are understandable long after attendees have completed the training and provide a variety of extra resource materials and references. Most Emagined course materials also include a glossary for the benefit of attendees who possess less background knowledge than others. Page 2
3 Description of Courses Emagined Security s courses focus general security awareness to specific technical security issues. We strive to make security training rewarding, educational and stimulating. Whether or not your audience has a security background, Emagined Security has a course that is right for you. We can tailor the content of each course to meet your specific requirements, or can even develop and teach a custom course geared specially towards your needs for you. Our standard course offerings include: CISSP Certification Preparation Course (Five days) Of all the information security-related certifications available, no certification is held by more information security professionals than the Certified Information Systems Security Professional (CISSP) certification. This course thoroughly covers the 10 Core Body of Knowledge (CBK) areas represented within the examination: Access Control Systems and Methodology Applications and Systems Development Business Continuity Planning Cryptography Legal, Regulations, Compliance and Investigations Operations Security Physical Security Security Architecture and Models Security Management Practices Telecommunications, Network & Internet Security This course helps attendees master fundamental terms and constructs required to pass the CISSP examination. Because the CISSP exam also includes many questions that require application of constructs, the course also includes numerous real-life case studies and situations. Attendees are also taught how to anticipate the types of items that are most likely to appear in the exam and strategies for answering these items. Practice questions that parallel real-life CISSP test questions are also presented throughout the course. A major advantage of this course over competing CISSP examination preparation courses is that this course is taught over a five-day period. Using the time-tested principle, attendees are Page 3
4 taught what is most important to learn to pass the test instead of being bombarded with so many details that the course content becomes overwhelming (as too often occurs in a longer course). Attendees thus walk out of the course with a knowledge structure that is most conducive to truly understanding course constructs, leaving them with a framework that will not only better help them to determine what knowledge or knowledge s each question is trying to tap, but also how to use sound reasoning to decide upon a good answer to each. CISM Certification Examination Preparation Course (Three days) Organizations are increasingly relying on complex information systems and applications to conduct their business and must thus ensure information security managers have the expertise to adequately manage the continuously growing number of associated security threats and risks. Additionally, organizations are facing a plethora of regulatory and compliance requirements, many of which are information security related, that if not adequately met can result in deleterious consequences. These challenges have elevated the importance of the role of the information security manager to new heights. Unfortunately, however, many individuals who hold information security management positions do not have the breadth and depth of knowledge nor do they have the ability to perform tasks necessary to adequately safeguard their organizations information assets and resources and to achieve regulatory compliance at an acceptable cost. CISM certification training is designed to help information security managers possess gain the requisite knowledge as well as understand how to perform essential tasks to achieve desired outcomes. Attendees will also be taught how to plan, implement and maintain a security program that will adequately safeguard their organizations information assets and resources at an acceptable cost. This three-day course covers the following five core areas of information security management in detail: 1. 1Information security governance. What information security governance is; why it is so important; its relationship to overall corporate governance; how to create a security framework and action plans; and how to determine whether objectives are being met; the elements and purpose of an information security policy, what standards, procedures and guidelines are and why they are important, and how policy, standards, procedures and guidelines are interrelated; what a security architecture is and why it is potentially so usefu Page 4
5 2. Risk management. What risk management is and why it is so important; what risk assessment is and how it works; strategies for dealing with risk; what a business impact analysis is and how it can be used in risk management; and how to determine the effectiveness of risk management. 3. Information security program management. What an information security program is, what its components are, and how to set such a program up; what controls and countermeasures are and how they can be used; types of controls and countermeasures and their effectiveness; and important additional considerations such as resource management. 4. Information security program maintenance. How to maintain and continuously monitor an information security program once it has been created; the many functions associated with program maintenance and how they should work; resource management considerations; security training and awareness; developing and using metrics and testing; compliance considerations. 5. Incident management. What incident management is and how it differs from incident response; what an incident response plan is and why it is critical; elements of and procedures involved in incident response; business continuity and disaster recovery planning, testing and execution; measuring the effectiveness of incident management. This course helps attendees learn essential terms and concepts necessary to pass the CISM exam. It also teaches attendees how to apply concepts to real-life information security situations and scenarios--more CISM exam questions that tap ability to apply concepts are present on a typical examination than any other type of question. Much of the training also involves answering practice questions that are extremely similar to actual CISM examination questions. Finally, attendees are taught how to carefully read each question to understand what type of knowledge each question is trying to tap and how to readily weed out incorrect answers. Responding to Incidents and Forensics (Two days) The world of computing, and in particular the Internet, is subject to a wide range of securityrelated threats. No matter what type and how many controls and countermeasures are deployed, security-related incidents continually occur. Trends over the last few years in fact indicate that not only are more incidents occurring, but their impact and severity are greater. Incident response has thus become a mainstream activity, partly out of necessity, but also because an increasing Page 5
6 number of organizations are realizing that an information security practice that does not achieve a reasonable balance between preventative controls and countermeasures and detective and reactive controls cannot be effective. This two-day course provides thorough coverage of the major aspects of responding to incidents, starting with planning and going on to day-by-day activities in which those who respond to incidents must engage. The goal is to teach attendees the things they need to do in real-life operations. Developed by the founder of the Department of Energy s Computer Incident Advisory Capability (CIAC), the course includes a variety of case studies and scenarios in which attendees are presented with descriptions of real-life security breaches and must deal with each step-bystep, making the course as real and relevant as possible. Topics covered include: An introduction to incident response Sizing the threat A methodology for incident response Tracing network attacks Legal considerations Forensics Setting and using traps and deceptive measures Responding to insider attacks Forming and managing an incident response team The course is designed for a wide range of attendees. Much of the information concerns policies, procedures, and administrative/management considerations. Detailed technical information is included at appropriate points in the course to help system and network administrators know exactly what to do, as well as to familiarize less technically proficient attendees about some of the technical side of incident response. Having at least some knowledge of and practical experience with Windows, Unix and Linux systems as well as networking is helpful in understanding the technical side of the course, but is not required. Page 6
7 Windows Server 2008 Security (Two days) Windows Server 2008 (WS2008) is the latest version of Microsoft server operating systems. WS2008 incorporates many security-related improvements and represents the most secure version of an operating system that Microsoft has ever produced. This two-day course is designed to help attendees understand these improvements and to learn the specific configurations that are necessary to ensure reasonable levels of security. Topics include: An introduction to WS2008 Security features and capabilities Vulnerabilities and vulnerability management WS2008 Active Directory Group Policy Objects Authentication File and share security Auditing Network security Using Windows Management Instrumentation (WMI) Conclusion This course is extremely technical in nature and is thus most appropriate for network and system administrators and system programmers, although auditors and IT staff who have some experience with Windows operating systems will be able to understand most of the concepts in this course. Unix Security (Two days) The Unix operating system is a dilemma. Its rich functionality, extensibility and portability have established this operating system in organizations throughout the world, yet more security incidents over the last two decades have involved Unix systems than any other type of operating system. This two-day course on Unix security presents the special problems and challenges that Unix presents for security, then systematically delves into technical and procedural measures that address these problems. The major emphasis is upon the most widely used flavors of Unix, but course content is applicable to all Unix flavors. This course is designed for Unix system and network administrators, system integrators, IT auditors and managers, computer programmers, security administrators, and Page 7
8 managers. Some knowledge of Unix functionality and commands is necessary for understanding the content of this course, but high levels of technical proficiency are not necessary. This course covers the following important topics: Introduction A high-level view of Unix security Major types of security-related vulnerabilities Physical security File protection System and network protection Account security Logging Special security features in different flavors of Unix The specifics---securing Solaris, HP-UX, IRIX and RedHat Application Security Encryption Auditing a UNIX System Useful tools (ssh, sudo, tcpdump, Tripwire, Crack, Fix-Modes, etc.) Wrap-up Linux Security Hands-on (Two days) The Linux revolution is here, and with it have come dozens of flavors of Linux as well as a large number of vulnerabilities. This two-day hands-on course teaches attendees what to actually do to secure their Linux systems. Each module begins with a brief explanation of a set of related security-related issues, then shifts to having each attendee go through steps that produce the intended result with the instructor serving as troubleshooter. Attendees then test the controls they have put in place to ensure that they work. Topics include: Overview Vulnerabilities Physical security Password security Account and group security Page 8
9 Securing services Host-based firewalls IP Tables and IP Chains Logging Updating and patching This course teaches virtually everything someone needs to know to implement the desired level of Linux security. A basic knowledge of Linux and particularly of commands for major shells such as bash and the Bourne shell is required. Securing IIS Web Servers (One day) Securing Web servers is in and of itself a difficult challenge, and IIS Web servers are no exception to this principle. Although Microsoft has greatly tightened default settings on this server starting with IIS 6.0, over the years more successful attacks (including Web page defacements, denial of service attacks, and many other types) against IIS Web servers are reported on sites such as attrition.org than against any other type of Web server. Unless Web developers and Webmasters know specifically what threats exist and how to counter them, IIS Web servers can serve as easy prey for attackers. This one-day course provides comprehensive coverage of IIS Web security, teaching Web developers and Webmasters what they need to know to secure IIS 6.0 and 7.0 Web servers. Highly technical in nature, the course starts with the basics of IIS Web deployment and functionality, then moves on to standard security options through advanced capabilities such as SSL/TLS encryption, and then covers advanced security issues, such as certificate issuance and handling. Topics covered include: An introduction to IIS 6.0 and 7.0 (major features, directory structures, virtual servers, virtual directories, and so on) Types of security-related vulnerabilities Types of security features Achieving baseline security Going beyond baseline security Page 9
10 Security administration IIS Web application security Wrap-up Because of the technical nature of the course, only those who have at least some knowledge of and practical experience with Windows systems and Windows security should attend. Knowledge of Web server design and implementation is helpful, but is not a prerequisite. Bringing a laptop with IIS installed is potentially helpful to attendees, but is not required. Apache Web Security (One day) Apache is the world s most widely deployed Web server. Although with nearly every subsequent release it has become more secure out-of-the-box, numerous configuration changes must be made and new modules must be compiled in if Apache is to run securely. Additionally, Apache servers need to be continually analyzed and their log output inspected to determine whether or not they have been compromised. This course presents a very comprehensive coverage of Apache security, from the initial installation to day-to-day operational deployment. Topics include: Apache basics Vulnerabilities and exposures Installation Configuring Apache for security (includes access control, PHP, SSL and TLS) Operational security procedures Application security Conclusion This course is designed especially for Web server administrators and Webmasters, and thus is very knowledge domain-specific and technical. Attendees without much knowledge and experience with Apache may still benefit from the course, however, if they understand basic Web services and protocols. Intrusion Detection and Prevention (Two days) Intrusion detection has grown from something that at one time was considered a black art to a mainstream activity in organizations throughout the world. Intrusion prevention is relatively new and with this newness come many uncertainties. Intrusion detection and intrusion prevention Page 10
11 involve considerably more than deploying intrusion detection systems (IDSs) and intrusion prevention systems (IPSs). The particular manner in which IDSs and IPSs are deployed greatly affects their usefulness, but few people genuinely understand the in s and out s of intrusion detection and intrusion prevention sufficiently to use each optimally. Additionally, successful use of intrusion detection and intrusion prevention requires establishing an infrastructure that includes appropriate policy provisions, management oversight, incident response procedures, and many other considerations. This two-day course puts it all together by providing attendees with in-depth information about the most critical aspects of intrusion detection and intrusion prevention. This course also teaches attendees what they need to know to set up an intrusion detection program and make sound technical and managerial decisions concerning deployment of the various elements of these programs. Topics covered include: Introduction Approaches to Intrusion Detection and Intrusion Prevention How IDSs and IPSs Work Intrusion Detection and Prevention Systems Architecture Case Studies: Real-Life IDSs Limitations in IDSs and IPSs Event Correlation The Administrative/Procedural/Legal Side of Intrusion Detection and Intrusion Prevention The Future of Intrusion Detection and Intrusion Prevention Wrap-Up This course is designed for a wide range of attendees, including system and network administrators, IT staff, information security staff, and auditors. It contains a mixture of technical and non-technical information. Some knowledge of networking, Unix, Linux and Windows operating systems is helpful in understanding some of the technical content of this course, but is not required. Page 11
12 Network Security (Two days) Today s computer networks have capabilities far beyond those envisioned by experts years ago. With the increased networking capabilities have come new, difficult challenges for achieving control and security. This two-day course provides a comprehensive view of networking-- its mechanisms and protocols--but with a security slant. It begins with a broad overview of networking, then proceeds to cover security-related threats and control mechanisms. The course also delves into specific network-related issues that users and organizations typically face and how to address them. Topics include: Networking basics Major types of network security exposures Major control measure solutions (including strengths and weaknesses of each) Securing network services Securing Web servers Firewalls Network monitoring Encryption Secure Wrap-up The course is designed for a wide range of attendees. Much of the information concerns policies, procedures, and administrative/management considerations. Technical information is included at appropriate points in the course with the intention of helping system and network administrators know exactly what to do as well as to familiarize less technically proficient attendees about some of the technical side of incident response. Having at least some knowledge of and practical experience with Windows, Unix and Linux systems as well as networking is helpful in understanding the technical side of the course, but is not required. Information Security Fundamentals (Two days) Computer security (more commonly known in professional circles as information security and in government circles as information assurance ) has grown substantially in importance over the years. System administrators, users, and managers are often forced to make changes because of security considerations without genuinely understanding why. This two- day course presents the Page 12
13 why s and wherefore s of information security/information assurance with the goal of helping you understand why things are done the way they are in this arena. Topics include: An introduction to information security The basics: Risk assessment and risk management Asset valuation and classification Vulnerabilities and exposures Types of control measures and countermeasures Weighing costs versus benefits Creating and maintaining an information security program Evaluating a security program s progress Dealing with compliance and regulation considerations Wrap-up This course includes a wide range of both high-level and technical information in addressing these issues. There are no prerequisites for attending this course. Cryptography (One day) Cryptography is an extremely interesting and potentially very useful area to information security professionals, yet few people genuinely understand the why s and wherefore s of cryptography. This one day course is designed to give IT and audit professionals a clear understanding of cryptography, how it works, how it can be used, and what the advantages and disadvantages of each cryptographical system or application are. Topics covered include: Major cryptographic methods When it is and is not appropriate to use each cryptographic method What makes cryptographic systems resistant to attack Major methods of key exchange and the strengths and weaknesses associated with each Practical applications based on cryptographic methods Wrap-up This course has no prerequisites, but some knowledge of mathematics is useful in understanding concepts that will be covered. Page 13
14 Mobile Computing Security (One day) The user computing environment has changed considerably over the last decade because of the increased mobility of users. Mobility poses many security-related challenges (anonymous connections, always on connections, cleartext network traffic, wireless networks, and so on), many or most of which are typically not adequately addressed, even though proven solutions are widely available. Topics covered in this course include: Introduction Vulnerabilities Policies and procedures Securing wireless networks Securing handheld devices Evaluating and auditing security in mobile environments Security products Wrap-up Included in the course is an intensive class exercise in which attendees evaluate a real-life mobile computing policy and propose ways to improve it. This course is appropriate for IT security and audit staff and system and network administrators. It contains a mixture of technical and non-technical content. A fundamental knowledge of networking and particularly network security would be helpful, but is not necessary. Page 14
LINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Implementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Security+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
Threat Modelling for Web Application Deployment. Ivan Ristic [email protected] (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic [email protected] (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
Linux Operating System Security
Linux Operating System Security Kenneth Ingham and Anil Somayaji September 29, 2009 1 Course overview This class is for students who want to learn how to configure systems to be secure, test the security
InfoSec Academy Forensics Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent
T R A I N I N G C O U R S E S T H E # 1 L I N U X A N D O P E N S O U R C E P R O V I D E R I N S A U D I A R A B I A Introd uction to Linux Administra tion Adva nce Linux Ad ministrati on Linux Identity
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN
Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Preliminary Course Syllabus
Preliminary Course Syllabus Designing Security for Microsoft SQL Server 2005 Elements of this syllabus are subject to change. Key Data Product #: 1917 Course #: 2787A Number of Days: 2 Format: Instructor-Led
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
eeye Digital Security Product Training
eeye Digital Security Product Training Retina CS for System Administration (4MD) This hands-on instructor led course provides security system administration/analysts with the skills and knowledge necessary
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
Managing and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
Shon Harris s Newly Updated CISSP Materials
Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
InfoSec Academy Pen Testing & Hacking Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
Information Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
CTI Higher Certificate in Information Systems (Engineering)
CTI Higher Certificate in Information Systems (Engineering) Module Descriptions 2015 CTI is part of Pearson, the world s leading learning company. Pearson is the corporate owner, not a registered provider
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
IT Risk & Security Specialist Position Description
Specialist Position Description February 9, 2015 Specialist Position Description February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 2 Explanation of Proficiency Level
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security
Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles -
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Analyze. Secure. Defend. Do you hold ECSA credential?
1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Citrix NetScaler 10 Essentials and Networking
Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Penetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD
Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD Resources Qinetiq Information Security Foundation Course (2002) Tittle, Stewart, and Chapple, 2004, CISSP: Certified Information Systems
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Planning and Administering Windows Server 2008 Servers
Planning and Administering Windows Server 2008 Servers Course 6430 Five days Instructor-led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
