The Information Security Specialist Certificate Program is offered as a daytime program.
Are you pursuing a security certification? Do you have the practical skills to work in the growing IT security filed? Acquire the knowledge and skills to detect a hacker, eradicate a virus or simply help fight cyber-warfare in your organization.
The Information Security Specialist Certification Program is a two-week training curriculum that prepares you to meet the increasing demands for skilled IT security professionals. This certificate program integrates theoretical and practical knowledge via hands-on labs combined with network design, implementation and management skills. Participants develop platform-independent expertise in securing IT systems. View more information and register today.
Foundation in Information Security
The first week of training focuses on understanding key concepts and builds critical core knowledge that will allow an ISSC-certified individual the platform-independent expertise required for today’s diverse technical environment. These concepts include understanding the TCP/IP protocol suite, and performing TCP and IP packets analysis. Data and communication encryption techniques will be discussed as well as hardening network devices and operating systems. An overview of intrusion detection systems, firewalls and other network technologies that can be used to provide security will be discussed.
Ethical Hacking 101
Offensive and defensive strategies are discussed. Offensive operations include instruction and demonstration of hands-on hacking techniques and discussion of penetration strategies with real world examples. Participants build a hackers “toolbox.” Defensive strategies include hardening Web servers, database systems and operating systems to prevent unauthorized access or disclosure of sensitive data. Hands-on lab modules include popular commercial and open-source tools.
Develop sound security policies in response to threats against IT systems.
Perform traffic analysis under TCP/IP and institute appropriate responses to intrusions.
Implement hardening techniques used for today’s operating systems
Understand Virtual Private Networks (VPN) and various encryption schemes for data transfer
Understand the Public Key Infrastructure (PKI) and the role of certificate authorities as enterprise-level verification systems for financial transactions among computer systems
Who Should Attend
The certification program is designed to help you meet the demand for highly skilled information security personnel. IT professionals seeking to develop experience in the field of information security will benefit from this program. A basic understanding of computers and PC operating systems is required.