Search

Seminars

Information Security Fundamentals



Introduction:


This course serves as an in depth introduction to the field of Information Security - it is not aligned to a specific examination or vendor accreditation and therefore the content can be updated on a regular basis. The course allows delegate extensive hands-on experience with a variety of security software and techniques. The content is vendor-agnostic and focuses on general information security. This course is designed for IT professionals and technical managers who want to understand key IT security issues and how best to address them. The course will also be of benefit to IT systems analysts, designers and software developers.

Course Objectives:


By the end of this course, delegates will be able to:

 

  • Understand the IT security threats faced by a modern network
  • Understand the techniques used to mitigate these threats
  • Respond to IT security incidents
  • Understand IT security policies
  • Understand cryptography and its uses
  • Understand authentication mechanisms
  • Understand the importance of physical security
  • Understand the compliance and legal requirements of an organization

Who Should Attend?


IT Engineers, IT Professionals, IT Directors, Engineers, IT Project Managers, IT Auditors, IT Compliance Managers, IT Coordinators, IT Support Managers, IT Officers, IT Support Specialists, IT System Administration, Technical Support Professionals, Chief Information Officers, Chief Risk Officers, Information Assurance Officers, Program Managers, Network Systems Analysts, Government Program Managers, R&D Project Managers, Software and System Developers, Chief Security Officers, Security Specialists, Chief Information Security Officers, Directors of Security, Security Architects, Security Operation Center Managers, Security Consultants, Security Managers, Security Auditors, Security Directors, Systems Administrators, Incident Response Analysts, Business Owners, Security Analysts, Security Systems Engineer, Network Architect, Operations Managers, Risk Management Professionals, Network Administration Professionals, Application Developers, Application Support Analysts, Application Engineers, Associate Developers, Technology Officers, Information Officers, Help Desk Specialist, Help Desk Technician, Database Administrators, Network Architects, Network Engineers, Network System Administrators, System Analysts, System Architects, System Designers

Course Outline:


Introduction to Information Security

  • Information Security fundamentals
  • Information Security models
  • IS standards
  • Attack overviews

 

Risk Management

  • Risk management process
  • Risk analysis
  • Risk control

 

Operating System Security

  • Popular operating systems
  • OS hardening
  • Vulnerabilities and the patch cycle
  • OS scanning

 

Access Control

  • Types of access control
  • Physical access
  • Controlling resource access
  • Microsoft Windows NTFS
  • Linux ext3/4
  • Cloud security

 

Encryption

  • Introduction to cryptography
  • Hashing
  • Encrypting stored data
  • Digital signatures
  • Public Key Infrastructure (PKI)
  • Encrypting network data
  • Transport Layer Security
  • Virtual private networks

 

Authentication

  • Authentication mechanisms
  • Good password strategies
  • Microsoft Windows Kerberos
  • Attacking Windows authentication
  • Linux authentication mechanisms
  • Certificate-based authentication
  • Biometric authentication

 

Legal Compliance & Security Policies

  • UK legal regulations
  • The role of security policies
  • Writing security policies
  • Ensuring business continuity

 

Application Security

  • General guidelines for application security
  • Securing web applications
  • Securing mail applications
  • Securing databases

 

Malware

  • Types of malware
  • Malware detection
  • Malware removal
  • Trojans
  • Rootkits
  • Botnets
  • Spam delivery

 

Perimeter Security

  • Network designs
  • Mobile workers
  • Firewalls
  • Proxy servers

 

Attacking TCP/IP

  • Weaknesses in TCP/IP
  • Securing network devices
  • IPSec
  • Network Intrusion Detection
  • SNORT

 

Wireless Network Security

  • Introduction to wireless networking
  • Problems with WEP
  • WPA2
  • Mobile IP

COURSE LOCATIONS

Code From To City Fee
IT53 13 Jan 2020 17 Jan 2020 Kuala Lumpur US$ 4500 Book
IT53 09 Mar 2020 13 Mar 2020 Shanghai US$ 5500 Book
IT53 04 May 2020 08 May 2020 Istanbul US$ 4500 Book
IT53 13 Jul 2020 17 Jul 2020 London US$ 5000 Book
IT53 28 Sep 2020 02 Oct 2020 Los Angeles US$ 5500 Book
IT53 01 Nov 2020 05 Nov 2020 Dubai US$ 4200 Book


DUBAI OFFICE

Ittihad Deira Building,
Al Ittihad Rd, Deira
Dubai,
UAE

info@petrogas-training.com

USA OFFICE

642 E14 Street,
10009-13 Manhattan,
New York (NY)
USA

info@petrogas-training.com

EGYPT OFFICE

52 General Kamal Hejab Street,
Suez Bridge,
Cairo,
Egypt

info@petrogas-training.com
 

COURSE CERTIFICATE

Certificate of Completion will be provided to the candidate(s) who successfully attend and complete the course. Training hours attendance percentage of 75% is required.


TRAINING HOURS

Standard course hours: 8:30 A.M. to 3:30 P.M. Informal discussions: 4:30 P.M. to 5:30 P.M.


TRAINING METHODOLOGY

We use a blend of interactive and hands-on methods, active participation, a variety of instructional techniques, dynamic presentations, individual and group exercises, in depth discussion, DVD’s, role-plays, case studies, examples. All of the information, competencies, knowledge and skills acquired within our training programs, are 100% transferrable to the participants’ workplace.


ASSESSMENT & EVALUATION

Pre-Test and Post-Test Assessment are applied on 5-day and 10-day programs. Also, post course evaluation and candidate’s evaluation are applied to add another level of quality measurement. Candidates’ feedback is highly appreciated to elevate the training service quality.


ORGANIZATIONAL IMPACT

A- Have staff trained in the latest training and development approaches

B- Support nationalization and talent management initiatives

C- Have properly trained and informed people who will be able to add value

D- Gain relevant technical knowledge, skills and competencies


PERSONAL IMPACT

A- Develop job related skills

B- Develop personal skills in subject matter

C- Have a record of your growth and learning results

D- Bring proof of your progress back to your organization

F- Become competent, effective and productive

G- Be more able to make sound decisions

H- Be more effective in day to day work by mastering job-related processes

I- Create and develop competency to perform job well


FREQUENT NOMINATIONS SCHEME

A- 10% discount after 05 candidates’ registration.

B- 15% discount after 10 candidates’ registration.    

C- 20% discount after 20 candidates’ registration.

D- 25% discount after 25 candidates’ registration.

E- 30% discount after 30 candidates’ registration

F- Higher discount rates will be offered based on work volume with different clients.  


SEVERAL NOMINATIONS ON THE SAME COURSE SCHEME

A- One extra free seat is offered on 4 candidates on the same course and dates.

B- Two extra free seats are offered on 6 candidates on the same course and dates.

C- Three extra free seats are offered on 8 candidates on the same course and dates.

D- Four extra free seats are offered on 10 candidates on the same course and dates.

E- Five extra free seats are offered on 12 candidates on the same course and dates.


REGISTRATION POLICY

Nominations to our public courses are to be processed by the client’s Training and/or HR departments. A refund will be issued back to the client in the event of course cancellation or seat unavailability. A confirmation will be issued to the relevant department official(s). 


CANCELLATION POLICY

If a confirmed registration is cancelled less than 5 working days prior to the course start date, a substitute participant may be nominated to attend the same course or a 20% cancellation charge is applied. In case of a no-show, a 100% fee will be charged.


PAYMENT POLICY

Payment is due upon receiving the course confirmation, invoice and/or proforma invoice. However; the fee due can be wire transferred to our bank account directly after course completion. Our bank details are illustrated on the confirmation, invoice and proforma invoice, as well. The above documents can be communicated electronically, i.e., in a soft copy or/and in hard copy based on customer’s request.


COPYRIGHT

© 2017. Material published by PETROGAS shown here is copyrighted. © 2017. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing in any medium, transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.