Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Day One
- Information Security Assurance
- Concepts of Information Security
- Framework for Information Security Assurance
- Cybersecurity Oversight
- Construction of Cybersecurity Legal System
- National Cybersecurity Policy
- Cybersecurity Ethical Standards
- Information Security Standards
Day Two
- Information Security Management
- Basics of Information Security Management
- Information Security Risk Management
- Construction of Security Management System
- Best Practices for Security Management System
- Information Security Management System
- Business Continuity
- Business Continuity
- Information Security Emergency Response
- Disaster Backup and Recovery
Day Three
- Security Engineering and Operations
- System Security Engineering
- Security Operations
- Content Security
- Social Engineering and Training
- Information Security Assessment
- Basics of Security Assessment
- Implementation of Security Assessment
- Information System Auditing
Day Four
- Information Security Support Technologies
- Cryptography
- Identity Verification
- Access Control
- Physical Environment and Network Communication Security
- Mainly Includes Physical Security
- OSI Communication Model
- TCP/IP Protocol Security
- Wireless Communication Security
- Prevention of Typical Network Attacks
- Cybersecurity Defense Technologies
Day Five
- Computing Environment Security
- Operating System Security
- Information Gathering and System Attacks
- Malware Protection
- Application Security
- Data Security
- Software Secure Development
- Software Secure Development Lifecycle
- Software Security Requirements and Design
- Software Security Implementation
- Software Security Testing
- Software Security Delivery
Day Six
- Examination
- The examination covers the content of the first five days.
Requirements
Target Audience:
- Enterprise Information Security Managers;
- Information Security Service Providers;
- IT or Security Consultants;
- IT Auditors;
- Information Security Trainers or Instructors;
- Information Security Incident Investigators;
- Other Professionals Engaged in Information Security-Related Work (such as System Administrators, Programmers, etc.).
- CISE (Certified Information Security Engineer): Suitable for Cybersecurity Technicians in Government Agencies, Large Enterprises, and Network Security Integration Service Providers;
- CISO (Certified Information Security Officer): Suitable for Cybersecurity Managers in Government Agencies and Large Enterprises, as well as Cybersecurity Consultants for Network Security Integration Service Providers;
- CISA (Certified Information Systems Auditor): Suitable for Cybersecurity Technicians in Government Agencies and Large Enterprises, as well as Cybersecurity Consultants for Network Security Integration Service Providers.
35 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
The topic is current and I needed to be updated