Pobierz kartę szkolenia

Introduction to IT security issues

kod szkolenia: BS.IT 01 / ENG AA 3d

Pakiety e-learning

poziom Podstawowy

W celu uzyskania informacji skontaktuj się z działem handlowym. W celu uzyskania informacji skontaktuj się z działem handlowym.
3 000,00 PLN 3 690,00 PLN brutto

The training is addressed to people who deal with IT system security at the company, especially for  Security Managers, SOC members, network and system admins.

At the training student is acquainted with IT security policy issues at the company, based on global standards and methods tested in huge corporations. The latest security technologies, which are compatible with requirements of Polish law in this area, will be presented during the training.

General IT knowledge from operational systems and network issues

  • Training: English
  • Materials: English
  • 3 days of work with a trainer 
  • Trainer’s supervision
  • Contact with community
  • Coursebook
  • Lab environment

Training method

  • lecture
  • workshops
  1. Introduction to the security topic
  • What is IT security?
  • Terminology
  1. Organizations and standards
  • Criteria of evaluating the level of security
  1. Security Management
  • Initiating IT security processes
  • Formulating security procedures
  • Dangers and securities considered while formulating security policy
  1. Cryptography and PKI environment
  • Terminology and standardizing organizations
  • Algorithms
  • Hash functions
  1. Protocols and mechanisms for securing data transmission
  • SSH
  • PGP
  • Data tunneling
  1. User authentication methods
  • LDAP
  • Kerberos
  1. Network and TCP/IP
  • Introduction to TCP/IP
  • Authentication methods in LAN networks
  • Wireless network security
  1. Network scanning
  • Network mapping
  • Port Scanning
  • Detecting OS
  1. Describing typical and current attack trends
  • Types of attacks
  • Prevention
  • Sources of information about new types of attacks
  1. Detection and Prevention Systems (IDS/IPS)
  • IDS host
  • IDS network
  • Firewalls
  • Firewall types
  • Actions and implementations
  1. VPN networks
  • IPsec VPN
  1. Good practices
  • Methods of verifying system’s integrity
  • Collecting and securing logs
  • What to monitor and how to do that?