Course Outline
Day One
- Information Security Assurance
- Concepts of Information Security
- Framework for Information Security Assurance
- Cybersecurity Oversight
- Construction of Cybersecurity Legal System
- National Cybersecurity Policy
- Cybersecurity Ethical Standards
- Information Security Standards
Day Two
- Information Security Management
- Basics of Information Security Management
- Information Security Risk Management
- Construction of Security Management System
- Best Practices for Security Management System
- Information Security Management System
- Business Continuity
- Business Continuity
- Information Security Emergency Response
- Disaster Backup and Recovery
Day Three
- Security Engineering and Operations
- System Security Engineering
- Security Operations
- Content Security
- Social Engineering and Training
- Information Security Assessment
- Basics of Security Assessment
- Implementation of Security Assessment
- Information System Auditing
Day Four
- Information Security Support Technologies
- Cryptography
- Identity Verification
- Access Control
- Physical Environment and Network Communication Security
- Mainly Includes Physical Security
- OSI Communication Model
- TCP/IP Protocol Security
- Wireless Communication Security
- Prevention of Typical Network Attacks
- Cybersecurity Defense Technologies
Day Five
- Computing Environment Security
- Operating System Security
- Information Gathering and System Attacks
- Malware Protection
- Application Security
- Data Security
- Software Secure Development
- Software Secure Development Lifecycle
- Software Security Requirements and Design
- Software Security Implementation
- Software Security Testing
- Software Security Delivery
Day Six
- Examination
- The examination covers the content of the first five days.
Requirements
Target Audience:
- Enterprise Information Security Managers;
- Information Security Service Providers;
- IT or Security Consultants;
- IT Auditors;
- Information Security Trainers or Instructors;
- Information Security Incident Investigators;
- Other Professionals Engaged in Information Security-Related Work (such as System Administrators, Programmers, etc.).
- CISE (Certified Information Security Engineer): Suitable for Cybersecurity Technicians in Government Agencies, Large Enterprises, and Network Security Integration Service Providers;
- CISO (Certified Information Security Officer): Suitable for Cybersecurity Managers in Government Agencies and Large Enterprises, as well as Cybersecurity Consultants for Network Security Integration Service Providers;
- CISA (Certified Information Systems Auditor): Suitable for Cybersecurity Technicians in Government Agencies and Large Enterprises, as well as Cybersecurity Consultants for Network Security Integration Service Providers.
Testimonials (5)
Multiple examples for each module and great knowledge of the trainer.
Sebastian - BRD
Course - Secure Developer Java (Inc OWASP)
Module3 Applications Attacks and Exploits, XSS, SQL injection Module4 Servers Attacks and Exploits, DOS, BOF
Tshifhiwa - Vodacom
Course - How to Write Secure Code
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
The trainer's subject knowledge was excellent, and the way the sessions were set out so that the audience could follow along with the demonstrations really helped to cement that knowledge, compared to just sitting and listening.
Jack Allan - RSM UK Management Ltd.
Course - Secure Developer .NET (Inc OWASP)
Nothing it was perfect.