To provide the knowledge and skills required to evaluate security risks inherent in information systems (workstations, servers, LAN, WAN, intranets, extranets and the Internet), and to identify the policies and countermeasures required to prevent them.
IT directors, projects managers and corporate managers.
Knowledge of computer science.
Very good teacher, good simplification.
Benoit L. / Spécialiste Conseil TI, IBM Canada ltée
- Introduction to information systems security
- Identifying risks and threats
- Cryptography and steganography
- Deep security: firewalls, intrusion detection systems, and decoy systems (Honeypot), virtual private networks
- Wireless networks: risks and solutions
- Virtual private networks (VPN): available technologies
- Logical security: password management and single sign-on
- Securing Web sites, servers and workstations
- Security incidents: implementing a pre-emptive action plan, and handling the response to an incident
- Security policies: risk analysis, security techniques, the role of security audits, and implementation strategies
- Developing security policies: the ISO 27000, 27001, 27002, 27003, 27004 and 27005 norms
- The CIS Critical Security Controls
Note: The ISO 27001, 27002 and 27005 norms are covered in detail in the Courses RE201 (27001/27002) and RE202 (27005)..