web security training Course Content
Elements of Information & Web Security, Legal, Ethical & Professional Issues in Information Security
- Security & its history
- NSTISSC Security Model
- Information system components
- Balancing security with access
- Security implementation
- System and Security Development Life Cycles
- Law & Ethics
- Relevant U.S. laws
- International laws
- Ethics & Codes of Ethics
The Need for Security
- Business needs
- Threats
- Attacks
- Top ten security vulnerabilities
- Secure software development
Risk Management
- Risk management overview
- Risk identification
- Quantitative and qualitative risk control
- Risk managements
- Risk control practice
- Risk assessments
- Risk control strategies & selection
Security Planning
- Security policy, standards & practices
- Information security blueprint
- Security education, training & awareness
- Continuity strategies
Security Technology: Firewalls & VPN & Intrusion Detection & Access Control
- Physical design
- Firewalls
- Protecting remote connection
- Intrusion detection & prevention systems
- Honey pots, honey nets & padded cell systems
- Scanning & analysis tools, access control devices
Cryptography
- Cryptography Foundations
- Cipher methods
- Cryptographic algorithm
- Cryptographic tools
- Protocols for secure communications
- Attacks on cryptosystems
Physical Security & Implementing Information Security
- Physical access controls
- Fire security & safety
- Supporting utility failure & structural collapse
- Data interception
- Mobile & portable systems
- Special considerations for physical security threats
- Project managements
- Technical implementation topics
- Nontechnical implementation topics
- Certification & accreditation
Security & Personnel & Information Security Maintenance
- Positioning & staffing
- Information security professional credentials
- Employment policies & practices
- Security for nonemployees
- Internal control strategies
- Privacy & security of personnel data
- Security management models
- Maintenance model
- Digital forensics