Module 1: e- Learning



Similar documents
Securing Data on Microsoft SQL Server 2012

MS-55096: Securing Data on Microsoft SQL Server 2012

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Table of Contents. Introduction. Audience. At Course Completion

(Instructor-led; 3 Days)

Information Security

Savitribai Phule Pune University

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Symmetric Mechanisms for Authentication in IDRP

Curran, K. Tutorials. Independent study (including assessment) N/A

Secure Network Communications FIPS Non Proprietary Security Policy

SOFTNIX LOGGER Centralized Logs Management

Certificate in Cyber Security

Introduction to Cyber Security / Information Security

Message Authentication Codes

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

INFORMATION TECHNOLOGY ENGINEER V

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Understanding digital certificates

BMC s Security Strategy for ITSM in the SaaS Environment

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

GE Measurement & Control. Cyber Security for Industrial Controls

IT Networking and Security

Computer System Management: Hosting Servers, Miscellaneous

NETWORK ADMINISTRATION AND SECURITY

InfoSec Academy Application & Secure Code Track

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Chapter 8. Network Security

Microsoft Dynamics CRM 2011 Installation and Deployment

Information and Communications Technology Courses at a Glance

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA

UM0586 User manual. STM32 Cryptographic Library. Introduction

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Bellevue University Cybersecurity Programs & Courses

Complying with PCI Data Security

Eleventh Hour Security+

Chapter 10. Cloud Security Mechanisms

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

NCTA Cloud Architecture

Enterprise Security Architecture Concepts and Practice

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

IoT Security Platform

Implementing Cisco IOS Network Security v2.0 (IINS)

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Module: Sharepoint Administrator

Advanced Authentication

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Implementing Cisco IOS Network Security

Ciphire Mail. Abstract

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

A Proxy-Based Data Security Solution in Mobile Cloud

Table of Contents. Introduction. Audience. At Course Completion

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Voice over IP Security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Study on Remote Access for Library Based on SSL VPN

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

CISA TIMETABLE (4 DAYS)

MCSE SYLLABUS. Exam : Managing and Maintaining a Microsoft Windows Server 2003:

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Installation and Deployment in Microsoft Dynamics CRM 2013

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

CDS and Clearing Limited Thapathali, Kathmandu 7 th Level (Technical) Syllabus

Content Teaching Academy at James Madison University

Angel Dichev RIG, SAP Labs

Course Outline. ttttttt

Overview. SSL Cryptography Overview CHAPTER 1

How To Integrate Software And Systems

Secure web transactions system

IINS Implementing Cisco Network Security 3.0 (IINS)

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

IT Networking and Security

First Semester Examinations 2011/12 INTERNET PRINCIPLES

NETWORK ADMINISTRATOR

Chapter 17. Transport-Level Security

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop

Transcription:

Module 1: e- Learning SECTION 1: OVERVIEW... 2 PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING... 2 Objective Objective:... 2 Task Statements... 2 Knowledge Statements (Knowledge of)... 2 Relationship between Task and Knowledge Statements... 3 Knowledge Statement Guide... 4 1

Section 1 SECTION 1: OVERVIEW PRIMER ON INFORMATION TECHNOLOGY, IS INFRASTRUCTURE AND EMERGING TECHNOLOGIES (12%) E-LEARNING Objective Objective: Demonstrate understanding of functioning of key components of existing and emerging information Technologies and their practical deployment. Task Statements 1.1 Identify deployment of different components of IT and their functions: Computer Hardware, Operating system software, database management software, application software, middleware, Client Server Model, Communications technologies and networks, internet, peripherals, devices, accessories, etc. 1.2 Recognise the configuration of hardware, operating system software, database management software and application software. 1.3 Recognise function of Telecommunications and Network security including wireless, encryption, firewalls, Cryptography etc. 1.4 Analyze baseline security procedures, firewall configurations, user administration and user management. 1.5 Distinguish the technology architecture of a typical data centre in a centralised environment identifying different layers/components of technology and their functions. Knowledge Statements (Knowledge of) 1.1 Information Technology components of Information Systems Infrastructure and related processes in the context of practical deployment in enterprises. 1.2 Fundamental concepts of different components of IT and their functions: Computer Hardware, Operating system software, database management software, application software, middleware, Client Server Model, Communications technologies and networks, internet, peripherals, devices, accessories, etc. 1.3 Configuration management of hardware, system software, database management software and application software. 2

Module 1: e- Learning 1.4 Telecommunications and Network security including wireless, encryption, firewalls, Cryptography etc. 1.5 Concepts related to applied cryptography, including plain-text, cipher-text, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. 1.6 Baseline security procedures, firewall configurations, user administration and user management. 1.7 Information Technology components of a Data Centre in centralised environment Relationship between Task and Knowledge Statements The task statements are what the ISA Candidate is expected to know how to perform. The knowledge statements delineate each of the areas in which is ISA candidate must have a good understanding in order to perform the tasks. The task and knowledge statements are mapped in the chart below. Note that although there is often overlap, each task statement will generally map to several knowledge statements. Task Statement 1.1 Identify deployment of different components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories, etc. 1.2 Recognize the configuration of hardware, operating system software, database management software and application software. Knowledge Statement 1.1 Information Technology components of Information Systems infrastructure & related processes in the context of practical deployment in enterprises. 1.2 Fundamental concepts of different components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories, etc. 1.3 Configuration management of hardware, operating system software, database management software and application software. 3

Section 1 1.3 Recognize function of Telecommunications and network security including wireless, encryption, firewalls, cryptography etc. 1.4 Telecommunications and network security including wireless, encryption, firewalls, cryptography etc. 1.5 Concepts related to applied cryptography, including plain-text, ciphertext, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. 1.4 Analyze baseline security procedures, firewall configurations, user administration & user management 1.5 Distinguish the technology architecture of a typical data centre in a centralised environment identifying different layers/components of technology & their functions. 1.6 Baseline security procedures, firewall configurations, user administration & user management 1.7 Information technology components of a Data centre in centralised environment. Knowledge Statement Guide Each knowledge statement is explained in terms of underlying concepts and relevance of the knowledge statement to the ISA Candidate. It is essential that the candidate understand the concepts. The knowledge statements are what the IS Auditor must know in order to accomplish the tasks. Consequently, only the knowledge statements are detailed in this section. The sections identified in the matrices are described in greater detail in the forthcoming part of this module. 1.1 Information Technology components of Information Systems infrastructure & related processes in the context of practical deployment in enterprises. Information Technology components, Information Systems infrastructure & related processes Chapter1, Part 1: 1.1 to 1.4 4

Module 1: e- Learning 1.2 Fundamental concepts of different components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories, etc. Components of IT and their functions: Computer Hardware, Operating System Software, Database Management Software, application software, middleware, client server Model, communications technologies & networks, internet, peripherals, devices, accessories. Chapter1: Part 1 to 3 1.3 Configuration management of hardware, operating system software, database management software and application software Configuration management of hardware, operating system software, database management software and application software Chapter1: 2 to 4 1.4 Telecommunications and Network security including wireless, encryption, firewalls, cryptography etc. Telecommunications and Network security, Chapter 3, Part 1 to 3 wireless, encryption, firewalls and cryptography. 1.5 Concepts related to applied cryptography, including plain-text, cipher-text, symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. Applied cryptography, plain-text, cipher-text, Chapter 3, Part 1 to 3 symmetric cryptography, asymmetric cryptography, digital signature, message authentication code, hash functions, and modes of encryption operations. 1.6 Baseline security procedures, firewall configurations, user administration and user management. 5

Section 1 Baseline security procedures, firewall configurations, user administration and user management. Chapter 3, Part 2 to 3 1.7 Information Technology components of a Data Centre in centralised environment IT components of a data centre in CBS environment Chapter 1, Part 4, topic 4.3 6