Course Objectives
In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.
You will:
- Identify the fundamental concepts of computer security.
- Identify security threats and vulnerabilities.
- Manage data, application, and host security.
- Implement network security.
- Identify and implement access control and account management security measures.
- Manage certificates.
- Identify and implement compliance and operational security measures.
- Manage risk.
- Troubleshoot and manage security incidents.
- Plan for business continuity and disaster recovery
Who Should Attend?
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.
Pre-requisite
To ensure your success in your course, you should possess basic Windows user skills and a fundamental understanding of computer and networking concepts. You can obtain this level of skills and knowledge by taking one of the following courses:
Using Microsoft® Windows® 8.1Microsoft® Windows® 8.1 Transition from Windows® 7 CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including configuring security parameters, are strongly recommended.
Pricing
Date
02nd-6th Sept 24
Sponsorship

The course is 100% claimable under HRDC
Course Outlines
- The Information Security Cycle
- Information Security Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
- Social Engineering
- Malware
- Software-Based Threats
- Network-Based Threats
- Wireless Threats and Vulnerabilities
- Physical Threats and Vulnerabilities
- Manage Data Security
- Manage Application Security
- Manage Device and Host Security
- Manage Mobile Security
- Configure Security Parameters on Network Devices and Technologies
- Network Design Elements and Components
- Implement Networking Protocols and Services
- Apply Secure Network Administration Principles
- Secure Wireless Traffic
- Access Control and Authentication Services
- Implement Account Management Security Controls
- Install a CA Hierarchy
- Enroll Certificates
- Secure Network Traffic by Using Certificates
- Renew Certificates
- Back Up and Restore Certificates and Private Keys
- Revoke Certificates
- Physical Security
- Legal Compliance
- Security Awareness and Training
- Integrate Systems and Data with Third Parties
- Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
- Respond to Security Incidents
- Recover from a Security Incident
- Business Continuity
- Plan for Disaster Recovery
- Execute DRPs and Procedures
Pricing & Sponsorship
Date
26th-28th Aug 2024
Sponsorship
