0845 450 6120

Information Security Fundamentals

Course Details

Name Information Security Fundamentals
DescriptionThis 5-day instructor-led course serves as an in depth introduction to the field of Information Security – it is not aligned to a specific examination or vendor accreditation and therefore the content can be updated by on a regular basis. This course is designed for IT professionals and technical managers who want to understand key IT security issues and how best to address them. The course will also be of benefit to IT systems analysts, designers and software developers. The course allows delegate extensive hands-on experience with a variety of security software and techniques. The content is vendor-agnostic and focuses on general information security.   PrerequisitesPrevious knowledge and use of the Internet is essential, particularly awareness of TCP/IP and standard Internet services such as the World Wide Web, e-mail and DNS.  This knowledge can be gained by attending our Introduction to Networking course. The course requires an understanding of Microsoft Windows operating systems; and familiarity with Linux would be an advantage.   Delegates will learn how to•Understand the IT security threats faced by a modern network•Understand the techniques used to mitigate these threats•Respond to IT security incidents•Understand IT security policies•Understand cryptography and its uses•Understand authentication mechanisms•Understand the importance of physical security•Understand the compliance and legal requirements of an organisation
URL
Location:
London - City
Start Date:
Days:
Price:
£2249.00 +vat
was £2395.00
Exam:
Residential:
Course ID:
358247
Offer

Overview

This 5-day instructor-led course serves as an in depth introduction to the field of Information Security - it is not aligned to a specific examination or vendor accreditation and therefore the content will be updated by QA on a regular basis.

This course is designed for IT professionals and technical managers who want to understand key IT security issues and how best to address them. The course will also be of benefit to IT systems analysts, designers and software developers.

The course allows delegate extensive hands-on experience with a variety of security software and techniques. The content is vendor-agnostic and focuses on general information security.

Learning Objectives

Delegates will learn how to

  • Understand the IT security threats faced by a modern network
  • Understand the techniques used to mitigate these threats
  • Respond to IT security incidents
  • Understand IT security policies
  • Understand cryptography and its uses
  • Understand authentication mechanisms
  • Understand the importance of physical security
  • Understand the compliance and legal requirements of an organisation

Pre-Requisites

  • Previous knowledge and use of the Internet is essential, particularly awareness of TCP/IP and standard Internet services such as the World Wide Web, e-mail and DNS.  This knowledge can be gained by attending our Introduction to Networking course
  • The course requires an understanding of Microsoft Windows operating systems; and familiarity with Linux would be an advantage.

Course Content

Introduction to Information Security

  • Information Security fundamentals, Information Security models, IS standards, attack overviews.

Risk Management

  • Risk management process, risk analysis, risk control.

Operating System Security

  • Popular operating systems, OS hardening, vulnerabilities and the patch cycle, OS scanning.

Access Control

  • Types of access control, physical access, controlling resource access, Microsoft Windows NTFS, Linux ext3/4, cloud security.

Encryption

  • Introduction to cryptography, hashing, encrypting  stored data, digital signatures, Public Key Infrastructure (PKI), encrypting network data, Transport Layer Security, virtual private networks.

Authentication

  • Authentication mechanisms, good password strategies, Microsoft Windows Kerberos, attacking Windows authentication, Linux authentication mechanisms, certificate-based authentication, biometric authentication.

Legal Compliance& Security Policies

  • UK legal regulations, the role of security policies, writing security policies, ensuring business continuity.

Application Security

  • General guidelines for application security, securing web applications, securing mail applications, securing databases.

Malware

  • Types of malware, malware detection, malware removal, Trojans, rootkits, botnets, Spam delivery

Perimeter Security

  • Network designs, mobile workers, firewalls, proxy servers

Attacking TCP/IP

  • Weaknesses in TCP/IP, securing network devices, IPSec, Network Intrusion Detection, SNORT.

Wireless Network Security

  • Introduction to wireless networking, problems with WEP, WPA2, mobile IP.

London - International House

Description:

Location:

International House
3rd Floor
1 St Katharines Way
London
E1W 1UN

 

Directions:

International House is a premier training centre located close to Tower Bridge, between St Katharine Dock and the Tower of London.


Car parking

The nearest car park is the NCP at Whitechapel High Street.

Rail

  • London Fenchurch Street Rail – 12 minute walk
  • London Cannon Rail – 20 minute walk
  • London Bridge Rail – 25 minute walk 

Tube

  • Tower Gate Way -  8 minute walk 
  • Tower Hill – 10 minute walk
  • Aldgate - 15 minutes walk  
  • Aldgate East – 17 minute walk
  • Monument – 18 minute walk 
  • Bank - 22 minute walk  
  • London Bridge Underground – 25 Minute walk

Buses

Routes 42, 78 and RV1 use the Tower of London stop (TL) on St. Katharine’s Way, just outside International House.

Our Customers Include