For 17 years InfoSec has been one of the most awarded and trusted IT training vendors - 42 industry awards!
IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.
Learn the essentials of enterprise security design for security engineering with this hands-on information security course. This course will bring you up to speed on the latest security-specific architecture.
Most importantly, Enterprise Security Architecture and Design Online course shows you how to implement the myriad of security technologies available on the market today in an effective and cost efficient manner.
The Enterprise Security Architecture and Design Online course is the online version of InfoSec Institute’s Instructor-Led Enterprise Security Architecture and Design class. Many online or CBT training offerings are simply a recording of a talking head. InfoSec Institute’s Application Security Online includes a shipment of software that is loaded onto your computer, which allows you to complete over 30 hours of hands-on lab exercises! Not only do you get high quality instruction from an expert instructor, with InfoSec Institute, you also perform hands-on lab exercises that allow for real knowledge transfer.
Some of the benefits of Data Recovery Online are:
We will never share any of your information, spam you or annoy you with pushy sales pitches.
A detailed outline of this course follows:
Module 3 – What The Hackers Know
Information on some of the quick and easy tools available for finding information that can be used in a more coordinated attack by hackers; Some common tools that identify network assets; How to show both technical and business
managers the amount of information that is exposed via the network
Lab – CHEOPS, Site TelePort Pro, NTOP, NmapFE, KMAP Module 4 – Enemies and Their Motivation
The most common hacker personality types; The reasons they participate in these activities; Common targets for these individuals
Module 5 – Assessing Vulnerabilities
Practical application of risk assessment to an organization; Basic understanding of vulnerability categories; Conducting an assessment; Commonly found weak links in an assessment; Reviewing how ‘breaking’ into your own network can be a practical way to get an accurate assessment of your risk
Lab – Vulnerability Assessment, exploit usage and windows password weaknesses
Module 6 – Objectives of Risk Management
Identifying specific areas where safeguards are needed to prevent deliberate or inadvertent unauthorized disclosure, modification, or unauthorized use of information, and denial of service
• How much protection is required
• How much exists
• The most economical way of providing it
• Reducing the identified risk to an acceptable level
Lab – Risk Assessment and Costs
Module 7 – Defining Security Policy
Developing computer security policies and procedures for Corporations that have systems connected to the Internet. Provide practical guidance to administrators trying to secure their information and services.
Module 8 – Developing Electronic Policy
Security tools by and large require that you create electronic policies from the written security policy in order to enforce compliance on the network we examine e-policies, often referred to as electronic or enforceable policies, and how they are used.
Lab – Translate Written Policy into E-Policy
Module 10 – Electronic Policy Baselines for Systems
Developing good security through system baselines; Using scripts to automate baseline implementation; Tools for detecting system changes
Lab – Security Configuration Manager
Module 11 – Structured Monitoring
Identifying policy and procedures; Log procedures using the Defense in Depth model; Identifying Critical and Weak link systems; Centralized, Remote, and Decentralized Monitoring; Hardening the Monitoring Stations; Minimizing Management Consoles
Module 12 – Intrusion Detection and Centralized Monitoring
Setup of a centralized monitoring system for a corporation; Identify cost effective placement of monitoring devices; Remote administration of monitoring systems
Lab – Snort & Packet Analysis
Module 13 – Overcoming Difficulty in Monitoring
Intrusion Detection: Differentiation of what is relevant to the Intrusion sequence, what is not relevant, and what is not part of the sequence.
Lab – Analyzing Attacks
Lab – Integrity verification and log monitoring
Module 15 – Justifying the Cost of Security
A business case is made for Return of Security Investment by showing some areas where security saves money on labor and other items.
Module 16 – Incident Investigation Methods
Incident investigation: the process, tools, and methods
Module 17 – Understanding the Logs
Tools and methods for identifying critical information contained in the log files
Lab – IIS Log Analysis
Module 18 – Security Planning for Electronic Business
Overview of the considerations necessary to securely and successfully implement electronic business over the Internet. Identifying the business structure required for conducting electronic business, identifying and minimizing the threats to electronic commerce, including threats that may involve electronic commerce ‘partners’.
Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.