Course Outline

first day

    Information Assurance Information Security Concept Information Assurance Framework
Network Security Supervision Network Security Legal System Construction
  • National Cyber Security Policy
  • Cybersecurity Code of Ethics
  • Information Security Standards
  • the next day
  • Information security management, including information security management foundation, information security risk management, security management system construction, security management system best practices, information security management system

      business continuity business continuity
    Information Security Emergency Response
  • Disaster backup and recovery
  • third day
  • Security Engineering and Operations System Security Engineering Security Operations Content Security Social Engineering and Training
  • Information Security Assessment Fundamentals of Security Assessment

      Security Assessment Implementation
    Information system audit
  • fourth day
  • Information Security Support Technology Cryptography Identity Authentication Access Control
  • Physical environment and network communication security mainly includes physical security
  • OSI communication model

      TCP/IP protocol security
    wireless communication security
  • Typical network attack defense
  • Network Security Protection Technology
  • fifth day
  • Computing environment security Operating system security Information collection and system attack Malicious code protection Application security Data security
  • Software Security Development Software Security Development Lifecycle
  • Software Security Requirements and Design
  • Software Security Implementation

      Software Security Testing
    Software Security Delivery
  • sixth day
  • Exam The scope of the exam covers the content of the previous five days
  • Requirements

    Object-oriented:

      Enterprise information security supervisors; information security service providers; IT or security consultants; IT auditors; information security lecturers or trainers; information security incident investigators; other personnel engaged in information security related work (such as system administrators, programmer, etc.). CISE (registered information security engineer): suitable for network security technicians of governments, major enterprises and institutions, and network security integration service providers; CISO (registered information security managers): suitable for network security management of governments, major enterprises and institutions It is also suitable for network security consultants of network security integration service providers; CISA (registered information security auditor): suitable for government, network security technicians of major enterprises and institutions, and also suitable for network security of network security integration service providers consultant staff.
     35 Hours

    Number of participants



    Price per participant

    Testimonials (3)

    Related Courses

    IBM Qradar SIEM: Beginner to Advanced

    14 Hours

    Introduction to ISO27001

    7 Hours

    CISA - Certified Information Systems Auditor

    28 Hours

    CISA - Certified Information Systems Auditor - Exam Preparation

    28 Hours

    CISMP - Certificate in Information Security Management Principles

    21 Hours

    CISSP - Certified Information Systems Security Professional

    35 Hours

    Certified Information System Security Professional (CISSP) CBK Review

    35 Hours

    FlexNet Administration

    14 Hours

    Introducing Information Security & Charting a Career Path

    7 Hours

    Fundamentals of Information Systems Security

    21 Hours

    Building up information security according to ISO 27005

    21 Hours

    Network Penetration Testing

    35 Hours

    Open Data Risk Analysis and Management

    21 Hours

    Public Key Infrastructure

    21 Hours

    Related Categories