| Code | Date | City | Fees | Register |
|---|---|---|---|---|
| IS004 | May 24, 2026 - May 28, 2026 | Milan | $ 6100 |
Register Course.. |
| IS004 | August 9, 2026 - August 13, 2026 | New Yourk | $ 6100 |
Register Course.. |
| IS004 | November 22, 2026 - November 26, 2026 | Manama | $ 5300 |
Register Course.. |
| IS004 | February 7, 2027 - February 11, 2027 | Dubai – UAE | $ 5300 |
Register Course.. |
________________________________________________________________________________________________
Objectives
- This course will help participants to:
- Describe the components of survivability
- Identify and define the components of an information security (is) model
- Describe the components of risk and asset management as applied to networked systems
- Identify the benefits of invoking sound security policies and methods for implementing them
- Describe the steps of the security knowledge in practice(skip) methodology
- Summarize key security concerns of the tcp/ip protocol suite
- Describe the benefits of cryptography when applied to is properties of confidentiality, integrity, and availability
- Describe common methods of gathering information on networked systems
- Describe the types of current vulnerabilities and threats to which an organization’s information assets may be exposed
- Identify common attack methods perpetrated against network systems
- Describe best practices for hardening and actively defending host and networked systems from intrusions
- Develop an approach for staying current with trends and requisite skills in information security
The Delegates
Technical staff members who manage or support networked information systems and have :
- Two years of practical experience with networked systems or equivalent training/education
- Some degree of specific familiarity with the iso/osi 7-layered reference model as well as ethernet, tcp/ip, and major network operating systems such as windows nt/2000/xp and unix .
Contents
- The Challenge Of Survivability
- Asset And Risk Management
- Policy Formulation And Implementation
- Security Knowledge In Practice
- Tcp/Ip Security
- Cryptography
- Prelude To A Hack (Information Gathering)
- Threats, Vulnerabilities, And Attacks
- Host System Hardening
- Securing Network Infrastructure
- Deploying Firewalls
- Securing Remote Access
- Intrusion Detection Systems
- Course Summary.
The Discount
10% in case of Three P. (or more)