385,000.00

Category: Tag:

Description

Date

1st Batch: 20th – 22nd Feb, 2025

2nd Batch: 15th – 17th May, 2025

3rd Batch: 31st July – 2nd Aug, 2025

4th Batch: 6th – 8th Nov, 2025

Event Details

To teach participants the best way to computer security, vulnerability analysis and control

 

CONTENT:

Securing Information

· Implement physical security measures

· Site location

· Cyber security

· Equipment protection

 

Information Security and risk management

· Risk management

· Security awareness

· Information security management

 

Guarding Against Attacks

· Security threats

· Virus attacks

· Social network threats

 

Handling Security Breaks

· Identifying incidents

· Respond to incidents

 

Identifying Cloud Computing and Virtualization Security Methods

· Fundamentals of cloud computing

· Fundamentals of virtualization Access control

· Access control threats

· Access to systems/ data

· Access control Technologies

· Assurance mechanism

 

Vulnerability analysis

· Scanning

· Password cracking

· Programming survival skills

· Exploit basics

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

Leave a Reply

Your email address will not be published. Required fields are marked *

Leave a Reply

Your email address will not be published. Required fields are marked *