Training agenda
- Introduction to the security topic
- What is IT security?
- Terminology
- Organizations and standards
- Criteria of evaluating the level of security
- Security Management
- Initiating IT security processes
- Formulating security procedures
- Dangers and securities considered while formulating security policy
- Cryptography and PKI environment
- Terminology and standardizing organizations
- Algorithms
- Hash functions
- Protocols and mechanisms for securing data transmission
- SSH
- PGP
- SSL/TLS
- Data tunneling
- User authentication methods
- Network and TCP/IP
- Introduction to TCP/IP
- Authentication methods in LAN networks
- Wireless network security
- Network scanning
- Network mapping
- Port Scanning
- Detecting OS
- Describing typical and current attack trends
- Types of attacks
- Prevention
- Sources of information about new types of attacks
- Detection and Prevention Systems (IDS/IPS)
- IDS host
- IDS network
- Firewalls
- Firewall types
- Actions and implementations
- VPN networks
- Good practices
- Methods of verifying system’s integrity
- Collecting and securing logs
- What to monitor and how to do that?