IT security – Hacking, firewalls and encryption

IT security – Hacking, firewalls and encryption

Course Summary

Participants will learn how to protect confidential information and the importance of following information management guidelines and best practices. Through practical exercises and scenarios, participants will gain experience in applying their knowledge to real-life situations and develop their ability to manage different security risks.

During the course, participants will go through:

  • Methods to perform a vulnerability assessment of networks and servers to identify security risks and vulnerabilities.
  • How to conduct penetration tests to evaluate the security of IT systems and networks.
  • How to manage firewalls, intrusion detection systems and other security solutions to protect information, IT systems and networks.
  • Encryption methods and techniques to protect sensitive information
  • Secure information management, including password and authentication management, safer use of cloud services and social media, and management of personal information and trade secrets.

Through practical exercises and scenarios, participants will gain experience in applying their knowledge to real-life situations and develop their ability to manage different security risks. The course also emphasizes the importance of ethical and legal aspects of information security, as well as the latest technologies and tools used to protect information and IT systems.

This product is currently out of stock and unavailable.

Course Objective

That you as a course participant are generally educated in IT security. You have gained a basic understanding of the various security threats that exist and what you can do to protect yourself against them.

Target Audience

The course is aimed at technicians, IT managers and project managers, product owners and developers.

Prerequisites

No prior knowledge required.

Certification

This course has no certification.

Trainer

The trainer for this course is Picox.

Course Details

1. introduction

2. overview of IT security

  • Safety areas
  • Threats and protection
  • Common attacks and security issues
  • Risk analysis and measures
  • IT security, threat, ease of use and cost
  • Manipulating and intercepting data

3. malicious code

  • Viruses, worms and Trojans
  • Targeted attacks
  • Problems with antivirus software and firewalls
  • Rootkits
  • Backdoors
  • Buffer overflows
  • Denial of service attacks, DOS, DDOS
  • Botnets and zombie computers

4. Verify security

  • Intrusion detection
  • Automated safety analysis
  • Commonly used software

5. Vulnerabilities

  • Vulnerabilities and attacks
  • CAN, CVE, BID
  • Reference pages
  • Checklists and updates
  • IP restrictions

6. application security

  • Requirements for in-house developed or purchased applications
  • Common mistakes
  • Validation of data
  • Design problem
  • Password management
  • Web security
  • Guidelines for programmers
  • Communication with other systems
  • SQL injection
  • Code injection
  • Brute force attackers
  • Problems with client/server solutions

7. firewalls

  • Filtering, statefull vs stateless
  • Local firewalls
  • Proxy
  • Firewall topology
  • IP restrictions
  • Whitelist vs blacklists
  • VPN, Virtual Private Networks

8. cryptography

  • Asymmetric cryptography
  • Symmetric cryptography
  • HASH algorithms
  • RSA, DES, AES, MD5, SHA
  • Certificates and certificate management
  • CA, certificate authority
  • PKI, public key infrastructure

9. physical information security

  • Shell protection
  • Safety zones
  • Mechanical and electronic protection
  • Identification and access control

10. Policies and safety standards

  • Security classification of information
  • Different types of policies
  • IT security instructions to users
  • System security plan
  • Design, implementation and compliance (PDCA)
  • Targeted policies for users, clients
  • ISO27001/BS7799-1
  • ISO27002
  • CC, common criteria
  • Requirements for municipalities
  • Guidelines on information security
  • Document classification
  • Processing of personal data
  • Things to consider when procuring cloud services
  • Physical security
  • Organization
  • System safety analysis

11. From the attacker’s point of view

12. How to protect yourself

13. closing

Course Overview

5 days

Can’t find a (suitable) date, but are interested in the course? Send in an expression of interest and we will do what we can to find a suitable opportunity.

Customized Courses

The course can be adapted from several perspectives:

  • Content and focus area
  • Extent and scope
  • Delivery approach

In interaction with the course leader, we ensure that the course meets your needs.

Send an expression of interest for the training

Send an expression of interest for the training