Kurs derzeit nicht verfügbar
e-Security
Kurs
Fernunterricht
Beschreibung
-
Kursart
Kurs
-
Niveau
Fortgeschritten
-
Methodik
Fernunterricht
-
Dauer
9 Tage
-
Versendung von Lernmaterial
Ja
The more our business depends on the Internet, the more we need to protect it against hackers, terrorists, organised crime and foreign intelligence.
Hinweise zu diesem Kurs
The more our business depends on the Internet, the more we need to protect it against hackers, terrorists, organised crime and foreign intelligence. During the highly topical distance learning course e-Security, consisting of nine lessons, the authors will look at how systems are typically penetrated, what steps can be taken to handle such incidents, and how to win the fight against theft, fraud and espionage. Seize this unique opportunity to create and implement a best-practice e-security policy, and register today!
If you manage an e-business or the IT infrastructure resources that support one, this is the course for you. The course will also help your technical staff who are trying to get to grips with the business impact of security; in the same way, it will also help your non-technical security specialists interpret any messages they get from infrastructure specialists.
Meinungen
Themen
- Technical
- Internet Security
- Management
- Server
- Internet
- Business
- E-security
- E-Business
- Security goals
- Securing Websites
Dozenten
IMF Academy (IMF)
IT, Information Technology, Finance, Project Management, Security, Tax
IMF is an independent publisher of distance learning courses and organizer of hot topical classroom based trainings and in-company trainings. Should you have questions of suggestions, please contact us at +31 40 246 02 20 or info@imfacademy.com
Inhalte
LESSON I
Why e-Security is necessary
- Threats to e-business
- Security goals
- Quantitative and technical analysis of threats
- Spoofing
- Denial-of-service attacks
- Sniffing, hacking
LESSON II
Security Architecture
- Security policy: firewall policy, e-mail and Internet policy, security architecture
- Security principles (least privilege)
- Technical security measures: network segmentation, firewalls, intrusion detection, secure configurations, secure application architectures
- Division of duties
- Security architecture components
LESSON III
Firewalls
- Firewall architectures
- Router, bastion host
- DeMilitarised Zone (DMZ)
- Packet filtering
- Application level filtering
LESSON IV
Securing Websites (inbound access)
- Website architectures
- Server security: web server, application and data(base) servers, WAP server and DNS server
- Transaction security
LESSON V
Secure Internet Use (outbound access)
- Internet and e-mail usage policy
- Mailserver security
- Proxy server
- Scanning: e-mail traffic for viruses, browser connections (Java applets, Java script, ActiveX)
LESSON VI
Identification, authentication, authorisation and encryption techniques
- Public Key Infrastructure (PKI) concepts
- Directory Services
- Single Sign-On (SSO)
- Trusted Third Party
LESSON VII
Security Management
- Security organisation: information strategy, plan, policy, security roles and responsibilities
- Security management processes
- Preventive, detective and corrective security measures
- Setting up security logging, monitoring and reporting
- Questions and answers
LESSON VIII
Legal Issues
- Outsourcing contracts (site development, site hosting, content management, personnel)
- Securing personal data
- Computer crime
- Legal aspects of e-commerce
LESSON IX
Dealing with Hackers
- Policy and legal measures
- Collecting evidence
- Using intrusion detection
- Honey pots and their uses
e-Security