This introductory course aims to build professionals capable of implementing and operating the ISMS, controls, policies and procedures with a focus on Networking Infrastructure. Protecting information assets in today's interconnected environment is a true challenge especially with the abundance of e-attacks and e-crime. Having a capable information security team within any organization is key to be able to implement best practice, monitor, and mitigate information risks. The course is highly interactive and the hands-on mainly focuses on latest information security techniques and tools.
Introduction to Linux
Exploits, Detection and Defenses/Response
Perimeter Defense, Systems Security and Monitoring
Basic Cryptographic Concepts Topics