I.T Security Essential Training

Course Code: IFIS CDE/02

What You Will Learn?

  • Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
  • Apply what you learned directly to your job when you go back to work
  • Run Windows command line tools to analyse the system looking for high-risk items
  • Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
  • Sniff open protocols like telnet, ftp, and determine the content, passwords, and vulnerabilities using Wireshark.
  • Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
  • Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
  • Build a network visibility map that can be used for hardening of a network – validating the attack surface and covering ways to reduce that surface by hardening and patching

$ 400, 5 Days

Includes

  • Certificate of completion
  • Full access to study materials
  • Access to summit ACADEMY

Share via:

Laptop Requirements

  • System running Windows 64-bit version
  • At least 8 GB RAM
  • 50 GB of available disk space (more space is recommended)
  • Administrator access to the operating system and all security software installed.
  • Anti-virus software will need to be disabled in order to install some of the tools.
  • An available USB port.
  • Machines should NOT contain any personal or company data.
  • Verify that under BIOS, Virtual Support is ENABLED.

About Course

This course is the first step to learn the most effective steps to prevent cybercrime occurrences and identify threats with hands on techniques that you can directly apply when you get back to work. You will learn from practical sessions delivered by professionals in the field with many years of experience. The knowledge attained will help you and your company that you can win the battle against the wide range of cyber adversaries that want to harm your environment. This course aims to enable students to understand properly how to secure and defend a network.

Learning Outcomes

You will learn;

  • Causes of system data losses and breaches
  • How to identify compromised systems on your network.
  • The value of each security device and their accurate configuration.
  • Setting up suitable security metrics

Prerequisites

Prior condition for this course

  • This course covers all of the core areas of security and assumes a basic understanding of technology, networks, and security

Course Outline

  • Network Security Essentials
  • Defense-In-Depth and Attacks
  • Threat Management
  • Risk management and response
  • Windows Security

Target Audience

  • Security professionals
  • Managers
  • Operations personnel
  • IT engineers and supervisors
  • Administrators
  • Forensic analysts, penetration testers, and auditors
  • Anyone new to information security with some background in information systems and networking.

Duration and Fees

Duration: 10 days
Pricing: $1200

Need to know more?

Contact Our team and get all your questions  answered or you can request for a call back

Request a Callback

Talk to us on +256 414 231 136 or fill in these details below and request a callback

By providing your details, you agree to our privacy policy

Certifications

Follow Us

  • Summit Consulting Ltd, 4th Floor Ntinda Complex
  • Plot 33, Ntinda Road Opp St. Luke Church. P.O. Box 40292, Kampala, Uganda.
  • staff@forensicsinstitute.com
  • +256(414) 231136

© All rights reserved Institute od Forensics & ICT Security

Privacy Policy

Terms of Use | Site Map