Jump to

At a glance

This five-day course provides a managerial perspective of contemporary computer and network security issues. The course teaches how to design, implement, and maintain a network security plan that can successfully defend a network from malicious or accidental intrusion.

Prerequisites: A working understanding of basic information security principles is a plus, but not required.

Course goals

After completing this course, learners should be able to:

  • Explain the concepts of information systems security as applied to an IT infrastructure
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure
  • Explain the importance of critical contributors to the effective implementation of security policy, such as access controls, operations, administration, security audits, testing, and monitoring
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems
  • Explain how businesses use cryptography to maintain information security
  • Analyze why network principles and architecture are important to security operations
  • Explain how attackers compromise systems, and what networks and defenses are used by organizations
  • Apply international and domestic information security standards and compliance laws to real-world implementation in both the private and public sector

Who this course helps

Governance, risk, compliance, and IT professionals, as well as anyone else who wants to understand how cybersecurity relates to their profession.

How it works

Delivery method

In-classroom instructor-led training

Duration

Five days