LINUX / INFORMATION SECURITY



Similar documents
[CEH]: Ethical Hacking and Countermeasures

EC Council Certified Ethical Hacker V8

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Brandman University. School of CCNA

EC-Council. Certified Ethical Hacker. Program Brochure

CEH Version8 Course Outline

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

EC-Council Ethical Hacking and Countermeasures

Page: Designed & Executed By: Presents Cyber Security Training

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH)

Information Systems Security Certificate Program

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Certified Ethical Hacker Exam Version Comparison. Version Comparison

CRYPTUS DIPLOMA IN IT SECURITY

CYBERTRON NETWORK SOLUTIONS

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Principles of Information Assurance Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Course Title: Course Description: Course Key Objective: Fee & Duration:

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

A Systems Engineering Approach to Developing Cyber Security Professionals

The Next Generation of Security Leaders

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Bellevue University Cybersecurity Programs & Courses

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Security Training Programs

Network Security Administrator

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

Designing Security for Microsoft SQL Server 2005

Certified Cyber Security Analyst VS-1160

CompTIA Security+ (Exam SY0-410)

Domain 1 The Process of Auditing Information Systems

Preliminary Course Syllabus

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

BUY ONLINE FROM:

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

CS Ethical Hacking Spring 2016

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Networking: EC Council Network Security Administrator NSA

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Click to edit Master title style

The monsters under the bed are real World Tour

Microsoft Technologies

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Detailed Description about course module wise:

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Certified Information Security Expert (CISEv3.0) Brochure Certified Information Security Expert Level 1 v3.0

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Certification Programs

Table of Contents. Introduction. Audience. At Course Completion

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Through the Security Looking Glass. Presented by Steve Meek, CISSP

InfoSec Academy Application & Secure Code Track

Access FedVTE online at: fedvte.usalearning.gov

Information and Communications Technology Courses at a Glance

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Ethical Hacking Course Layout

Information Technology Policy

CERTIFICATE COURSE 1 ST YEAR onwards ADD ON COURSE. Computer Hardware Networking and Ethical Hacking. Semester I

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Understanding Security Testing

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

IT Security. Securing Your Business Investments

Certified Cyber Security Analyst VS-1160

(Instructor-led; 3 Days)

USM IT Security Council Guide for Security Event Logging. Version 1.1

SONDRA SCHNEIDER JOHN NUNES

InfoSec Academy Pen Testing & Hacking Track

Shon Harris s Newly Updated CISSP Materials

RMAR Technologies Pvt. Ltd.

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Certification Programs

Application Intrusion Detection

EC-Council Certified Security Analyst (ECSA)

e-code Academy Information Security Diploma Training Discerption

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

MS Configure and Troubleshoot Identity Access Solutions with Windows Server 2008 Active Directory

Hackers are here. Where are you?

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

The McAfee SECURE TM Standard

FSP-201: Ethical Hacking & IT Security

Passing PCI Compliance How to Address the Application Security Mandates

Transcription:

LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance, stable and inexpensive server. Throughout this course, you gain the essential knowledge and hands-on skills to leverage Linux for your organizational advantage. You learn to create, edit and search Linux files, control permissions and ownership, process and format text data, and use shell scripts to perform multiple tasks. Manage, control and automate Linux GNU open source tools Create, edit and search Linux files and directories Limit access within the file system by controlling permissions and ownership Combine GNU filter commands in pipelines to process and format text data Exploit Bash shell features to enhance the command line interface Perform multiple tasks in shell scripts COURSE Introducing Linux Accessing the System The GNOME desktop starting at the command line Managing Files and Directories Naming files and directories Organizing files under directories working with Linux files Controlling Access to Linux Resources Defining access rights to files collaborating via group membership adopting multiple roles

Searching the system Manipulating streams Tail, gawk and cut Editing files and streams Leveraging Bash Shell Features Customizing Bash behavior Initializing context Enhancing interactivity Automating Tasks with Shell Scripts Invoking shell scripts Testing and controlling execution Executing Jobs and Processes Monitoring processes with ps and top Archiving and retrieving data Mounting storage devices System administration basics Basic computer knowledge GHC 450 5 weeks (3 hours per session)

Red Hat System Administration I Red Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. Focused on administration tasks that will be encountered in the workplace, this course will actively engage students in task-focused activities, lab-based knowledge checks, and facilitative discussions to ensure maximum skill transfer and retention. In addition, GUI-based tools will be featured to build on the students' existing technical knowledge, while key command line concepts will be introduced to provide a foundation for students planning to become full-time Linux system administrators. By the end of the five-day course, students will be able to perform installation, establish network connectivity, manage physical storage, and perform basic security administration GHC 400 6 weeks (3 hours per session) Red Hat System Administration II Red Hat System Administration II without the RHCSA Exam (RH134) is designed for IT professionals working to become full-time enterprise Linux system administrators. The course is a follow-up to System Administration I and continues to utilize today's best-of-breed, contemporary teaching methodology. Students will be actively engaged in task-focused activities, lab-based knowledge checks, and facilitative discussions to ensure maximum skills transfer and retention. Building on the foundation of command line skills covered in System Administration I, students will dive deeper into Red Hat Enterprise Linux to broaden their "tool kits" of administration skills. By the end of this five-day course, students will be able to administer and troubleshoot file systems and partitioning, logical volume management, access control, package management. GHC 400 6 weeks (3 hours per session)

SECURITY AWARENESS PROGRAM The Security Awareness Program will provide organizations or individuals with a highly effective educational solution that promotes awareness of company policies and directly addresses the security issues associated with employee behaviors. Critical components of the awareness program include the management of access ids, passwords and data by employees. The participants will be capable of critically reviewing existing security policies, procedures and awareness program initiatives as well as make recommendations upon completion of the program. Depending on the status of the Security Policies, it may be necessary to revise or develop Security Policies. BENEFITS Sensitizing staff on essence of maintaining confidentiality and integrity of information in the work environment. Educating staff to keep records and manage documents efficiently and effectively. Present C as an authoritative and readily secure working environment. Educating staff on the Ethics of communication between the staff within departments, between departments and between superiors and subordinates The security awareness program Include; Should be an end user. GHC 200 1 Week (3 hours per session)

CERTIFICATE IN INFORMATION SECURITY The Zentech Information Security certificate program provides an in depth exposure to information security principles, practices, methods, and tools. The program is available for professionals who wish to build upon their knowledge in IT Security. BENEFITS Understand the role of risk assessment and data classification in making security cost justification decisions involving modern security systems and components Understand the terms, tools and techniques that will support their ability to eliminate as many threats as possible and to engineer an appropriate response for all others Appreciate the role and need for an educated user community Establishing a security strategy Security risk assessment Data Classifications Developing a layered security architecture The role of security policy, training and testing Engaging industry resources and support Enterprise Identity Management Layered security architecture (tools and technique) Change management control Incident response and forensic investigation Experience in management information infrastructure GHC 600 : 4 Weeks 3 hours per session

CERTIFIED INFORMATION SYSTEM SECURITY PROFESSIONAL (CISSP) This course provides a comprehensive overview of information security concepts and industry best practices and is the only review course endorsed by (ISC) 2. In this course, you cover the ten CISSP domains as outlined in the (ISC) 2 CBK and analyze the latest information-system security issues. You also develop an individual study plan to enhance your exam preparation skills You Will Learn Prepare for CISSP Certification based on the (ISC) 2 CBK Identify the access control mechanisms that create a security architecture and protect assets Recognize the cryptography principles, means and methods of disguising information Explore business continuity and disaster recovery planning for the preservation of business operations Examine core elements of network security including network structures and transmission methods Inspect the key security concepts for application software development Information Security and Risk Management Access Control Cryptography Physical Security Security Architecture and Design Business Continuity Planning and Disaster Recovery Planning Telecommunications and Network Security Application Security Operations Security Legal, Regulations, Compliance and Investigation GHC 1250 15 weeks (4 hours per session) (Classes are normally organized on Saturdays)

CETRTIFIED INFORMATION SYSTEM AUDITOR (CISA) Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing Information System audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. In addition, it presents a number of professional and personal benefits. Zentech will make you a CISA professional. IS Audit Process IT Governance Systems and Infrastructure Lifecycle IT Service Delivery and Support Protection of Information Assets Business Continuity and Disaster Recovery WHO SHOULD ATTEND? This course is for those individuals with an interest in Information Systems auditing, control, and security. Should have audit experience. GHC 1000 per participant (including the cisa manual) (please note that the fees excludes the international exams) 8 Weeks (6 hours per session)

ETHICAL HACKING AND COUNTER MESURES SUMMARY This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. WHO SHOULD ATTEND This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Module 01: Introduction to Ethical Hacking Module 02: Foot printing and Reconnaissance Module 03: Scanning Networks Module 04: Enumeration Module 05: System Hacking Module 06: Trojans and Backdoors Module 07: Viruses and Worms Module 09: Social Engineering Module 10: Denial of Service Module 11: Session Hijacking Module 12: Hijacking Webservers Module 13: Hacking Web Applications Module 14: SQL Injection Module 15: Hacking Wireless Networks Module 16: Evading IDS, Firewalls, and Honeypots Module 17: Buffer Overflow Module 18: Cryptography Module 19: Penetration Testing 950 : 8 weeks 3hours a session

ADVANCE CERTIFICATE IN IT AUDIT This intensive two weeks program outlines the concepts of information technology you need to know in order to understand the audit concerns in the IT environment. You will learn the general audit concepts; acquire an understanding of the various Information Technology methods; evaluating the various information security and system controls necessary to ensure confidentiality, authenticity and accountability. OBJECTIVE Understand how information systems impact the internal audit department. Understand audit concerns in the IT environment. Acquire baseline knowledge of general computer control concepts. Learn the basics of how to perform an IT audit. Acquire baseline knowledge of application control concepts. IT Audit Overview Frameworks Conducting the IT Audit Information Security Information Systems Strategy and Planning Database Implementation and Support Business Continuity Planning Information Systems Operations Application Systems Implementation and Maintenance Relationships with Outsourced Providers Ethical Hacking Business Process Controls Testing Network Support System Software Support Hardware Support Resources Must be an I.T professional or an Auditor GHC 650 per participan : 5 Weeks (3 hours per session)