Information Security

This is a practical workshop designed to aid participants to learn about Network Reconnaissance using Windows or Linux; Vulnerability Identification; Investigation and Research and, Penetration Testing with Metasploit. Participants will also be taken through System Remediation and Hardening, Web Browser Security and Configuration, Data Management, Data Backup, Access Controls, Host Intrusion Detection, Log Security Issues, Network Intrusion Systems, Privacy and Anti-Forensics, and Network Traffic Analysis.

Learning Outcomes

At the end of the training participants will be able to:

  • Secure their corporate networks from network attacks thereby reducing the prevalence of cyber crime.
  • Integrate and manage all aspects of cyber crimes in their organisations as a result of the knowledge acquired.
  • Ensure customers’ confidence in their various organisations.

Content

  • Building a secure organization
  • A cryptography primer
  • Verifying user and host identity
  • Preventing systems intrusions
  • Guarding against network intrusions
  • Ensuring network confidentiality

Who Should Attend

This course is designed for Network Administrators, IT Security, Corporate and Financial IT Audit Personnel, IT Managers and Directors who are aspiring to be CISSP or CISA Certified