SANS Security Essentials Course.

July 25th, 2009

SANS Security Essentials Course will take place at NTI from 25th to 30th July 2009 the course teaches the language and underlying theory of computer security. At the same time teaches the essential, up-to-the-minute knowledge and skills required for effective performance if trainees are given the responsibility for securing systems and/or organizations.

  • Risk Assessment and Auditing.
  • Host and Network Based Intrusion Detection.
  • Honeypots, Firewalls and Perimeter Protection.
  • Security Policy.
  • Password Management.
  • Security Incident Handling - The Six Steps.
  • Information Warfare.
  • Web Security.
  • Network Fundamentals and IP Concepts and Behavior.
  • Cisco Router Filters.
  • Four Primary Threats for Perimeter Protection.
  • PGP, Steganography.
  • Anti-Viral Tools.
  • Windows (2000, XP, 2003, Vista) Security Administration and Auditing.
  • IIS Security.
  • Unix Security Fundamentals.

Day One.

Networking Concepts: Day one teaches how networks, routers, firewalls, and the related protocols like TCP/IP work.

Defense In Depth: Day two covers security threats and their impact, including information warfare. It also covers sound security policies and password management tools, the six steps of incident handling, and Web server security testing.

Internet Security Technologies: Day three gives a roadmap that will help to understand the tools and options available for deploying systems for defense in depth.

Day Four.

Secure Communications: Day four covers encryption, wireless security, and operations security.

Day Five.

Windows Security: Day five is all about securing the current batch of Windows operating systems (Windows 2000/XP/2003/Vista) and teaches the tools that simplify and automate the process.

Day Six.

Based on industry consensus standards, this course provides step-by-step guidance on improving the security of any Linux system. The course combines practical how-to instructions with background information for Linux beginners and security advice and "best practices" for administrators of all levels of expertise.

<< First < Previous Next > Last >>
Record   52  of   74