0345 4506120

Security for IT Practitioners

Who should attend this Course?

People who currently work in IT.

Security for IT Practitioners course includes the following topics:

  • Security responsibilities of IT practitioners
  • Planning, implementation and maintenance of departmental IT security
  • Requirements for responding to IT security incidents and supporting related activities

The hands on course will provide a dynamic learning experience where users can explore foundational principles in Cyber Fundamentals, security architecture, risk management, attacks, incidents, and emerging IT and IS technologies


Learning Objectives

This Security for IT Practitioners course is a 5-day course that will take anyone in a current IT job role into the world of Information Security. This is a fantastic start point for those wanting to go into IT’s biggest growth area, Information Security. Many practical labs are used throughout the course to improve student understanding of theoretical concepts and give them experience of real-world products. This course is aimed at individuals who want to move into the Information Security arena or simply want to gain a broader working knowledge of the topic.

The Security for IT Practitioners course offers practical training in areas such as TCP/IP, types of attack, applied cryptography, multi-firewalls and intrusion detection systems, Internet and operating system security. The course helps individuals to move into the security arena or to simply gain a broader working knowledge in the field of Information Security, enabling delegates to plan a security policy and implement the latest security related technologies.

Course Content

To give students of all levels a good appreciation of security issues when dealing with computers and networks, also giving them the ability to plan and implement a security policy with the latest security technologies.

  • Introduction to security
  • TCP/IP for Security
  • Applied Cryptography
  • Virtual Private Networks
  • Types of Attack
  • Firewall Roles and Types
  • Firewall Design Topology and Management
  • World Wide Web Security
  • Intrusion Detection Systems
  • Operating System Security
  • The Auditing Process
  • Wireless Networking

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include