Course Outline
first day
- Information security
- Information security concept
- Information Security Assurance Framework
- Cybersecurity supervision
- Construction of Cybersecurity Legal System
- National Cybersecurity Policy
- Cybersecurity Code of Ethics
- Information Security Standards
the next day
- Information Security Management
- Includes Information Security Management Fundamentals
- Information Security Risk Management
- Safety management system construction
- Safety Management System Best Practices
- Information Security Management System
- Business Continuity
- Business Continuity
- Information Security Emergency Response
- Disaster backup and recovery
Day 3
- Safety Engineering and Operations
- System Safety Engineering
- Security Operations
- Content Security
- Social Engineering and Training Education
- Information security assessment
- Safety Assessment Basics
- Safety Assessment Implementation
- Information System Audit
Day 4
- Information security support technology
- Cryptography
- Identity Authentication
- Access control
- Physical environment and network communication security
- Mainly includes physical security
- OSI Communication Model
- TCP/IP protocol security
- Wireless communication security
- Typical network attack prevention
- Network security protection technology
Day 5
- Computing environment security
- Operating system security
- Information collection and system attacks
- Malicious code protection
- Application Security
- Data Security
- Software Security Development
- Software Security Development Lifecycle
- Software security requirements and design
- Software security implementation
- Software Security Testing
- Secure software delivery
Day 6
- take an exam
- The exam covers the content of the previous five days.
Requirements
Object-oriented:
- Corporate information security executive;
- Information security service providers;
- IT or security consultants;
- IT auditors;
- Information security lecturers or trainers;
- Information security incident investigators;
- Other personnel engaged in information security-related work (such as system administrators, programmers, etc.).
- CISE (Certified Information Security Engineer): Suitable for network security technicians in government, major enterprises, institutions, and network security integration service providers;
- CISO (Certified Information Security Officer): Suitable for network security managers in government, major enterprises and institutions, and also suitable for network security consultants of network security integration service providers;
- CISA (Certified Information Security Auditor): Suitable for network security technicians in the government, major enterprises and institutions, and also suitable for network security consultants in network security integration service providers.
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.