Course Outline

first day

  • Information security
    • Information security concept
    • Information Security Assurance Framework
  • Cybersecurity supervision
    • Construction of Cybersecurity Legal System
    • National Cybersecurity Policy
    • Cybersecurity Code of Ethics
    • Information Security Standards

the next day

  • Information Security Management
    • Includes Information Security Management Fundamentals
    • Information Security Risk Management
    • Safety management system construction
    • Safety Management System Best Practices
    • Information Security Management System
  • Business Continuity
    • Business Continuity
    • Information Security Emergency Response
    • Disaster backup and recovery

Day 3

  • Safety Engineering and Operations
    • System Safety Engineering
    • Security Operations
    • Content Security
    • Social Engineering and Training Education
  • Information security assessment
    • Safety Assessment Basics
    • Safety Assessment Implementation
    • Information System Audit

Day 4

  • Information security support technology
    • Cryptography
    • Identity Authentication
    • Access control
  • Physical environment and network communication security
    • Mainly includes physical security
    • OSI Communication Model
    • TCP/IP protocol security
    • Wireless communication security
    • Typical network attack prevention
    • Network security protection technology

Day 5

  • Computing environment security
    • Operating system security
    • Information collection and system attacks
    • Malicious code protection
    • Application Security
    • Data Security
  • Software Security Development
    • Software Security Development Lifecycle
    • Software security requirements and design
    • Software security implementation
    • Software Security Testing
    • Secure software delivery

Day 6

  • take an exam
    • The exam covers the content of the previous five days.

Requirements

Object-oriented:

  • Corporate information security executive;
  • Information security service providers;
  • IT or security consultants;
  • IT auditors;
  • Information security lecturers or trainers;
  • Information security incident investigators;
  • Other personnel engaged in information security-related work (such as system administrators, programmers, etc.).
  • CISE (Certified Information Security Engineer): Suitable for network security technicians in government, major enterprises, institutions, and network security integration service providers;
  • CISO (Certified Information Security Officer): Suitable for network security managers in government, major enterprises and institutions, and also suitable for network security consultants of network security integration service providers;
  • CISA (Certified Information Security Auditor): Suitable for network security technicians in the government, major enterprises and institutions, and also suitable for network security consultants in network security integration service providers.
 35 Hours

Testimonials (5)

Upcoming Courses

Related Categories