Enterprise Security

Duration 5 days

Price 1,800.00 plus VAT

Edinburgh 25th July



Course Description
Aimed at a wide audience that may include people with little or no technical knowledge, this course makes extensive use of analogies, demonstrations, illustrative examples, and workshops to build a sophisticated insight into information security.

Who should attend?
This course will significantly benefit managers, network and systems administrators, auditors, end users and anyone who wants to gain a greater awareness of information security.

Prerequisites: Basic IT literacy

Delivery Method: Instructor-led, classroom-delivery

Course Description
Security weaknesses in an enterprise lie in the areas that that the organisation doesn't know about. This course examines the often subtle ways that, despite having deployed a full range of security measures, there are often devious ways that these measures can be circumvented. This course is informed by our other courses the Enterprise Security course brings it all together and shows how you can identify and close the gaps in your organisation's security.

Duration: 5 Days

Who should attend? This course will significantly benefit Security officers, Auditors, Security professionals, Information Security Officers, Information Systems Managers, Consultants, Systems and Data Security Analysts, System administrators, and anyone who wants to gain competence in enterprise level security, incident response, and intrusion avoidance.

Prerequisites: A good knowledge of file systems computer operations, networking, DOS and Microsoft Windows

Delivery Method: Instructor-led, classroom-delivery with structured, hands-on activities.

What Delegates Gain From the Course

On completion of the Protecting the Enterprise course, delegates will have learned how to:

  • Develop a comprehensive security policies
  • Develop a set of security procedures
  • Identify areas of vulnerability
  • Track security breaches, and find and apply security patches
  • Harden Windows and Linux operating systems against known vulnerabilities
  • Plan/configure access rights to ensure network-level security
  • Determine which tools to use to check for attack points
  • Combat the vulnerabilities inherent in Web server software and apply relevant fixes
  • Plan your security architecture
  • Find out how to deal with and investigate intrusions
  • Identify the tools commonly used to penetrate systems
  • Use system logs and monitoring tools for auditing
  • Develop incident response strategy and procedures
  • Create Forensic readiness plan
  • How to detect and defend against internal intrusion attempts

Some of the Featured Tools, Applications and Products

Windows NT4/2000 Linux 7.2 NMAP, NESSUS, CIS, Stealth, Internet Security Systems, Esafe, Viruswall, L0phtcrack, Check Point Firewall-1, Security Analyst, System Scanner, Microsoft IIS, Tripwire, SecureIIS, Snort, Bastille, Portsentry, IIS 5, Apache, TDS, Network Monitor, Ethereal and many more..