Minnesota State Community and Technical College Detroit Lakes Campus
|
|
|
- Noel Harrison
- 10 years ago
- Views:
Transcription
1 Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus
2 Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future Questions
3 Philosophy You cannot defend what you do not understand. The program is designed to train students to work in entry level ljobs Network security Network administration
4 Philosophy (cont d) Program is based in skills students need to be employed. Advisory Committee of Security and Network Administrators i meet yearly to update curriculum
5 Note on 2 Year Colleges Students care about real world experience Education is focused on learning a job skill Vital for technical faculty to stay current in the field to maintain credibility
6 Certifications Microsoft MCP MCSA CompTIA Security+ Linux+ MCSE Server+ Network+ Planet 3 CWNA Cisco CCNA
7 Program Overview Associates of Applied Science (71 credits) Half of the degree is network administration i i Half of the degree is security administration
8 Program Objectives Design and maintain secure computer networks Recognize security breaches and implement countermeasures Develop a disaster recovery plan Demonstrate professional communication skills in relation to computer networking Demonstrate ethical skills in relation to computer security Evaluate current practices and recommend security measures Demonstrate need for policy in implementation of security
9 General Education GSWS 1102 Contemporary Career Search INTD 1104 Systems Administration ENGL 1101 College Writing I PHIL 1201 Ethics CSEC 1102 Careers in Information Systems PSYC 1200 General Psychology SPCH 1114 Intro to Public Speaking MN Transfer Electives (2 classes) CPTR1104Intro to Computer Tech MATH 0090 Introductory Algebra
10 Networking Courses CPTR 1108 Cisco 1 CPTR 2224 Linux I INTD 1104 Systems Administration CPTR 1118 Cisco 2 CPTR 2272 Network Operating Systems CSEC 2202Introduction o to Wireless Networking CSEC 2204 Managing Directory Services CSEC 2216 Advanced Routing CSEC 2218 Disaster Recovery CPTR 2282 E Mail Administration
11 Security Courses CSEC 1110 Fundamentals of IT Security CSEC 2210 Security Breaches & Countermeasures CSEC 2212 Web Security CSEC 2222 Network Security Design CSEC 2228 Network Defense CSEC 2230 Computer Forensics Students are required to sign a statement of ethics
12 CSEC1110 Fundamentals of IT Security Course Objectives: Identify the components of Information Systems Security (INFOSEC) Explain Operations Security (OPSEC) Discuss the components of Information Security Employ the elements of Information Systems Security (INFOSEC) Formulate security policies and guidance documents Interpret legal issues within Information Security Apply the concepts of risk assessment Analyze the concepts of system life cycle management Demonstrate t the concept of trust t Employ the modes of computer operation Analyze the roles of various organizational personnel Apply the facets of Information Security
13 CSEC1110 Fundamentals of IT Security (cont d) Book: Security+ Guide to Network Security Fundamentals Second Edition Course Technology; CSSIA Lab Manual Course Activities: Students use some basic tools to get an overview of security MBSA; Wireshark; IPSorcery; EBCD; Snadboy Revolution; Cain and Able Write weekly pp papers on security vulnerabilities
14 Objectives: CSEC 2210 Security Breaches & Countermeasures Describe threats t to and vulnerabilities of systems Perform risk management functions Plan a security assessment using current practices Perform a security assessment using current practices Utilize current tools to assess network security Conduct a penetration test using current practices Employ information reconnaissance techniques Conduct an IT audit using current best practices Implement countermeasures for networks Complete written documentation of threats Evaluate methods of non network methods to gain network access Analyze methods attackers avoid detection Conduct attacks on a controlled network Demonstrate ethics
15 CSEC 2210 Security Breaches & Countermeasures (cont d) Books: Assessing Network Security Microsoft Press (no longer in print); Network Security Assessment O Reilly; Microsoft VBSCRIPT Step by Step Microsoft Press; CSSIA Lab Manual Course Activities: i i 3 weeks on VBScript 10 weeks on Penetration Testing Information gathering Report generation Hacking techniques Defensive measures 2 weeks on capture the flag
16 CSEC2212 Web Security Objectives: Investigate t current web technologies Apply current web browser security best practices Create web site virtual servers and directories Manage web folders Implement secure web communications with SSL Troubleshoot web client connectivity Implement effective logging Employ web site authentication Implement FTP server to current standards Apply current best practices to secure an Apache web server Apply current best practices to secure an IIS server Install IIS following current best practices Install llapache web server following current best practices
17 CSEC2212 Web Security (cont d) Books: Apache Security O Reilly; Microsoft IIS 6.0 Administrator s Pocket Consultant Microsoft Press; Apache Phrasebook O Reilly Course Activities: Students spend 7 weeks on securing Apache Students spend 7 weeks on securing IIS Certificates / SSL Directory security Browser security Securing FTP
18 CSEC 2228 Network Defense Objectives: Outline physical security measures to current best practices Identify personnel security practices and procedures Explain software security best practices Outline network security Describe administrative security procedural controls Define cryptosecurity Indicate proper key management procedures Interpret transmission security models Name the elements of TEMPEST security Complete firewall planning and design to current best practices Distinguish firewall cryptography strategies Construct a packet filtering i firewall
19 CSEC 2228 Network Defense (cont d) Books: Guide to Firewalls and Network Security Intrusion Detection and VPNs Course Technology; Managing Security withsnort and IDSTools O Reilly Course Activities: Learn proper design of network defenses Work with Cisco PIX Build and configure a Snort system Implement tproxies Work with various personal firewalls Complete a written proposal p and presentation on firewalls
20 CSEC 2230 Computer Forensics Objectives: Examinecomputer forensicsasa a profession Explain the steps in a computer investigation Evaluate current computer forensic tools Employ proper procedures fin processing crime and incident scenes Apply digital evidence controls Select the best data acquisition methods for each investigation. Describe computer forensics analysis Demonstrate procedures to recover image files Employ standard procedures to perform network forensics Use specialized e mail computer forensics tools Formulate report findings with forensic software tools Examine disks of various file systems Demonstrate t proper e mail investigation techniques
21 CSEC 2230 Computer Forensics (cont d) Book: Guide to Computer Forensics and Investigations 3 rd Edition Course Technology Course Activities: Students use Windows tools: FTK, WinHex, ProDiscover, Helix Students learn to use Linux tools: Autopsy, Sleuth, dd, Fubuntu Required to write a report on starting up a forensic lab.
22 CSEC 2222 Network Security Design Objectives: Identify components of network security planning Describe components of systems life cycle management Conduct a network vulnerability analysis using current best practices Implement a computer network Construct a secure network framework Implement security countermeasures using current best practices Demonstrate ability to secure a network client to current best practices Demonstrate t ability to secure network resources to current best practices Demonstrate ability to secure network server to current best practices Implement a DMZ Demonstrate ethics
23 CSEC 2222 Network Security Design (cont d) Book: MCSE Guide to Designing Security for a Microsoft Windows Server 2003 Network Course Technology Course Activities: Capstone course: students must use a technology learned in each class used in their education 5 weeks on secure design 6 weeks on building and securing their network 4 weeks on conducting a security assessment on a different team s network The building a assessment phases require a written report and presentation
24 CSEC 2222 Network Security Design (cont d) Capstone Project Requirements for Minimum System Requirements 2008 Active Directory Provided Equipment DNS 3 servers DHCP 2 laptop Exchange Cisco 2500 router Cisco Wireless 1 Cisco Switch Cisco Router 1 Cisco 1232 Access Point. Cisco scoswitch Wireless client machine IIS Apache FTP site
25 CCDC Collegiate Cyber Defense Competition 8 students from the program on the team each year 2007 and 2008 held at InverHills CC edu
26
27 Program Numbers Class of 2007 Class Graduates 10 Graduates 3 continued education 1 K 12 school 1 military (Army Info Sec) 1 family business 1 State of Montana 1 Veterans Admin 1 small business owner 3 Microsoft 6 unknown at this time Class of students 3 ISP Class of students
28 Faculty Information Technology 5 faculty 1 Computer Network Security 2 Web Development 1 Computer Network Technology (Online degree) 1 Help Desk Technician
29 Future Certificate in Computer Network Security Scheduled to be offered Spring 2009 (Online) 4 classes Web Security Fundamentals of IT Security or Network Security Security Breaches and Countermeasures Network Defense Enrollment controlled by interview with instructor
30 Future (cont d) Pursuing CNSS 4011 and 4013 certification
31 Questions
Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7
1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network
Table of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Certified Professional Exams Student Materials Course Outline Introduction This four-day, instructor-led course provides students
Network Engineering Technology
Network Engineering Technology Network Engineering Technology with Specializations in: Cisco Routing and Switching Microsoft Systems Administration Cyber Security and Digital Forensics Associate in Science
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Sandhills Community College
Networking Technology Associate in Applied Science Networking Fundamentals Diploma Cisco Networking Certificate Linux Networking Certificate Microsoft Networking Certificate Network Security Certificate
Cybersecurity AAS Program
Cybersecurity AAS Program New Program Proposal State Submission Steve Buchholz, Dean of Accreditation and Advancement July 2015 TABLE OF CONTENTS Executive Summary... 2 Identification and Description of
Information Technology Cluster
Network Systems Pathway Information Technology Cluster Assistant Network Technician -- This major prepares students to install, configure, operate, and connections to remote sites in a wide area network
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Computer Network Engineering
226 Computer Network Engineering Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Computer Network Engineering Certificate of Achievement: Computer Network Engineering
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Security+ P a g e 1 of 5. 5-Day Instructor Led Course
P a g e 1 of 5 Security+ 5-Day Instructor Led Course Overview This course is the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic
Information Technology Programs - Catalog Year 2014-2015
NEXT Page UPDATED: 10/20/14 Click on your Plan. Go to that page. Information Technology Programs - Catalog Year 2014-2015 Find the Right Educational Degree Plan There are two distinctly different ways
Computer Information Technology
Computer Information Technology Business and Social Sciences Division, Room A44, (847) 543-04 The Computer Information Technology degree programs provide five specialty options with a common core of general
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus
NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus CSCI - 440 Network Security and Perimeter Protection 3-0-3 CATALOG DESCRIPTION This
Allegany College of Maryland. 239 Cisco Networking 2 * Offered Fall semester and
Cybersecurity comes to Allegany College of Maryland 107 Intro to Cybersecurity Offered fall and spring semesters. This course provides a broad overview of computer security, ethical issues and information
MCSA Security + Certification Program
MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Michigan Technological University. Development of System Administration & Network Security Curriculum
Michigan Technological University Development of System Administration & Network Security Curriculum Prof. Yu Cai Prof. Guy Hembroff March 24, 2006 Computer Network & System Administration Program The
COMPUTER SCIENCE & INFORMATION TECHNOLOGY
ST. JOHNS RIVER STATE COLLEGE COMPUTER SCIENCE & INFORMATION TECHNOLOGY Computer Information Technology Computer Network Engineering Technology Computer Programming and Analysis Computer Programmer Computer
Cybersecurity Education Doesn t Always Take Place in the Classroom
Cybersecurity Education Doesn t Always Take Place in the Classroom Margaret Spivey, Stephen Shank, Anthony Hanners Community College Cyber Summit, 3CS Moraine Valley CC, Palos Hills, IL, July 21, 2014
Computer Network Engineering
208 Computer Network Engineering Degrees, Certificates and Awards Associate in Science: Certificate of Achievement: Skills Competency Award: Cisco Networking Associate Program Description The field of
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *
SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 [email protected], [email protected]
Jibran Ilyas DIRECTOR
PROFESSIONAL EXPERIENCE STROZ FRIEDBERG, LLC Director, Incident Response, July 2015 to Present Assistant Director, Incident Response, August 2014 to July 2015 Assist in development of incident response
Computer and Information Science
Computer and Information Science www.odessa.edu/dept/computer Faculty: Katrieva Jones- Munroe, chair The computer information systems curriculum provides students with practical, job- related computer
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Computer Support & Network Administration
Computer Support & Network Administration What You Will Learn MCTC s Information Technology program has two A.A.S. awards: Computer Support and Network Administration and Software Development, as well
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
APPLICATION FOR BOARD APPROVAL. of Locally Developed Course. MCP CERTIFICATION 11/12a/12b/12c
APPLICATION FOR BOARD APPROVAL of Locally Developed Course MCP CERTIFICATION 11/12a/12b/12c John Murtha APPLICATION FOR BOARD APPROVAL Of the Locally Developed MCP CERTIFICATION 11/12a/12b/12c PREAMBLE:
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Computer Security and Investigations
Computer Security and Investigations Program Locations: Program Code: Coordinator: Credential: Peterborough CSI Blair Brown Ontario College Advanced Diploma Start Dates: September 06, 2016 January 09,
Information Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
Diploma in Information Technology Network Integration Specialist COURSE INFO PACK
Registered as a Private Higher Education Institution with the Department of Higher Education and Training in South Africa under the Higher Education Act 1997 Registration Nr. 2001/HE07/005 Diploma in Network
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole
The Future Is SECURITY THAT MAKES A DIFFERENCE Overview of the 20 Critical Controls Dr. Eric Cole Introduction Security is an evolution! Understanding the benefit and know how to implement the 20 critical
MS-6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008
MS-6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 This five-day instructor-led course teaches the features and technologies of Windows Server 2008
Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK
Diploma in Information Technology COURSE INFORMATION PACK REGISTRATION AND ACCREDITATION Prestige Academy (Pty) Ltd is a widely recognized and credible institution. Prestige Academy is registered with
Information Technology Programs Offered for Year 2013-2014
Information Technology Programs Offered for Year 2013-2014 Click on your Plan. Go to that page. Computer Programming Applications Development- Microsoft C# - AAS................ 2 Applications Development-
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review
We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review The security threat landscape is constantly changing and it is important to periodically review a business
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid
Protecting Energy s Infrastructure and Beyond: Cybersecurity for the Smart Grid Which is it? Cyber Security ~or~ Cybersecurity? Dr. Ernie Lara President Presenters Estrella Mountain Community College Dr.
Design and Configuration of a Network Security and Forensics Lab
Design and Configuration of a Network Security and Forensics Lab Billy Harris [email protected] Joseph Kizza [email protected] Mike Ward [email protected] ABSTRACT This paper describes the design
Wyoming Community College Commission Request for New, Pilot or Revised Degree or Certificate Program
Community Commission Request for New, Pilot or Revised Degree or Certificate Program A. : Laramie County Community B. Date submitted to WCCC: C. Program 1. Request for: X New Program Pilot Program Revised
Information Systems and Tech (IST)
California State University, San Bernardino 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey
Implementing Security Education at a Small Community College
PRACTICAL SECURITY Implementing Security Education at a Small Community College Corrinne Sande Whatcom Community College Abstract: Key words: This paper discusses modifying an existing two-year degree
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
2016 TÜBİTAK BİLGEM Cyber Security Institute
2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
INFORMATION SECURITY TRAINING CATALOG (2016)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2016) Revision 4.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led
TABLE OF CONTENTS NETWORK SECURITY 1...1
Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Diploma in Network (LAN/WAN) Administration
Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a
MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)
MCITP Windows 2008 Enterprise Edition is considered as Microsoft s most reliable, scalable and high-performing server operating system. It has been designed to simplify the process of Migration from the
MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008
MS-6416D: Updating Your Windows Server 2003 Technology Skills to Windows Server 2008 Description This five-day instructor-led course teaches the features and technologies of Windows Server 2008 and Windows
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs)
Learning Tree Training Pre-approved Training for Continuing Education Units (CEUs) Note: Approved training courses in this document are subject to change without prior notification. Training submitted
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY. Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS:
CENTRAL TEXAS COLLEGE ITSY 2401 FIREWALLS AND NETWORK SECURITY Semester Hours Credit: 4 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION A. Identify elements of firewall design, types of security threats and
Updating Your Windows Server 2003 Technology Skills to Windows Server 2008
Updating Your Windows Server 2003 Technology Skills to MS6416: 5 Days Course Overview This five-day instructor-led course teaches the features and technologies of and R2 to IT professionals who have specialist
Cisco Network Specialist CCNA
Web Development I CIST 1510 3 Scripting Technologies CIST 1520 3 Web Graphics I CIST 1530 3 Information Security Fundamentals CIST 1601 3 PHP Programming I CIST 2351 4 Web Technologies CIST 2510 3 Web
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
CompTIA Security+ In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.
CompTIA Security+ Duration: 40 Hrs Course Description Overview: CompTIA Security+ (Exam SY0-401) is the primary course you will need to take if your job responsibilities include securing network services,
2015-2016 Information & Telecommunication Technology
PROGRAM GUIDE 2015-2016 Information & Telecommunication Technology Information and Telecommunications Technology Associate in Applied Science Degree 60 credits Information and Telecommunication Technology
The Risks that Pen Tests don t Find. OWASP 13 April 2012. The OWASP Foundation http://www.owasp.org
The Risks that Pen Tests don t Find 13 April 2012 Gary Gaskell Infosec Services [email protected] 0438 603 307 Copyright The Foundation Permission is granted to copy, distribute and/or modify
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
Technology Fee Proposal
Technology Fee Proposal Title: Virtual Environment for Information Security Education and Exploration Proposer: Joseph N. Wilson, Assistant Professor CISE Department Rm. E301 CSE Bldg. 42 Box 116120 Gainesville,
How To Learn To Use A Computer System
Computer Repair & Networking Organization Washburn Institute of Technology Program Number 11.0901 Instructional Level Certificate Target Population Grades 11 & 12 Post-secondary Description This program
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
CCA CYBER SECURITY TRACK
CCA CYBER SECURITY TRACK 2013-2014 CCA Advanced Cyber Security Track A detailed description of the advanced cyber security track. Courses to be offered in the CCA Advanced Cyber Security Track 2013-2014
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
