We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Details

Best Practices in IT Management & Information Security

Threats, Attacks and Vulnerabilities

  • Analyze indicators of compromise and determine the type of malware
  • Compare and contrast types of attacks
  • Explain threat actor types and attributes
  • Explain penetration testing concepts
  • Explain vulnerability scanning concepts
  • Explain the impact associated with types of vulnerabilities

Outline

Threats, Attacks and Vulnerabilities

  • Analyze indicators of compromise and determine the type of malware
  • Compare and contrast types of attacks
  • Explain threat actor types and attributes
  • Explain penetration testing concepts
  • Explain vulnerability scanning concepts
  • Explain the impact associated with types of vulnerabilities

Technologies and Tools

  • Install and configure network components, both hardware and software-based, to support organizational security
  • Use appropriate software tools to assess the security posture of an organization
  • Troubleshoot common security issues
  • Analyze and interpret output from security technologies
  • Deploy mobile devices securely
  • Implement secure protocols

Architecture and Design

  • Explain use cases and purpose for frameworks, best practices and secure configuration guides
  • Implement secure network architecture concepts
  • Implement secure systems design
  • Explain the importance of secure staging deployment concepts
  • Explain the security implications of embedded systems
  • Summarize secure application development and deployment concepts
  • Summarize cloud and virtualization concepts
  • Explain how resiliency and automation strategies reduce risk
  • Explain the importance of physical security controls
  • Identity and Access Management
  • Compare and contrast identity and access management concepts
  • Install and configure identity and access services
  • Implement identity and access management controls
  • Differentiate common account management practices

Risk Management

  • Explain the importance of policies, plans and procedures related to organizational security
  • Summarize business impact analysis concepts
  • Explain risk management processes and concepts
  • Follow incident response procedures
  • Summarize basic concepts of forensics
  • Explain disaster recovery and continuity of operations concepts
  • Compare and contrast various types of controls
  • Carry out data security and privacy practices

Cryptography and PKI

  • Compare and contrast basic concepts of cryptography
  • Explain cryptography algorithms and their basic characteristics
  • Install and configure wireless security settings.
  • Implement public key infrastructure

Speaker/s

A distinguished team of facilitators who are eminently qualified professionals has been assembled to lead discussions in course of the workshop.

Special Offer

5% discount for 3-5 participants and 10% discount for 6 and above number of participants from the same organization.
Reviews
Be the first to write a review about this course.
Write a Review

Alpha Partners is a reputable firm of Training and Management Consultants with many years of corporate training experience in Finance, Accounting, Auditing, Banking, Management, Information Technology, Oil and Gas Sector, Security, Engineering, Public Relations, Secretarial Studies, Leadership, Marketing and other fields of human endeavour.

We are one of the leading players in the profession. Our firm, a multi-disciplinary one with highly talented, experienced and dedicated partners and staff who have experiences in different facets of working life was established in 1996 and has branches in Lagos, Enugu and Awka.

We offer a wide range of professional services, which covers audits, accounting, finance, taxation, ICT, security, engineering, insurance, human resources management, secretarial and consultancy services in all ramifications.

Our numerous clients attest to the high quality services we offer which contribute in no small measure in ensuring sound and efficient management of their resources.

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.