Special Offer - 80% OFF

Code: FOREOCON80, Available until ...

  • 00 Days
  • 00 Hours
  • 00 Minutes
  • 00 Seconds

Course curriculum

    1. Introduction

    2. Information Assets

    3. Information Security objectives (CIA)

    1. Types of security controls

    2. Physical Security

    1. Identity and Access Management (IAM): Concepts

    2. Identity and Access Management (IAM): Components

    3. Firewall, DMZ and WAF

    4. Network segmentation

    5. Intrusion Prevention System (IPS)

    6. Encryption: Symmetric and Asymmetric methods

    7. Encryption: Hybrid method

    8. Encryption: Digital signature and Hashing

    9. Encryption: Illustrative scenario

    10. Encryption: Virtual Private Network (VPN)

    11. Encryption: HTTPS/SSL

    12. Encryption: Data at rest

    13. Encryption: Keys and Certificates Management (PKI, HSM,...)

    14. Security Training and Awareness

    15. Hardening

    16. Data Loss Prevention (DLP)

    1. Intrusion Detection System (IDS)

    2. Security Information and Event Management (SIEM)

    3. Vulnerability Assessment

    4. Application security

    5. Security audits and Penetration Testing

    6. Configuration Management

    1. Incident Response

    2. Patch Management

    3. Anti-malware and Endpoint security

    1. Recovery controls

About this course

  • $130.00
  • 40 lessons
  • 2 hours of video content
  • 10 Quiz and Exams
  • Interactive discussions
  • French, Italian, Arabic, Chinese, Spanish, Hindi, English

Course description

  • Course Overview

    The course provides a comprehensive understanding of information security from Governance, Security controls, industry standards (COBIT5, NIST SP 800-53, ISO 27001, ...), to Risk management, Incident response and Business continuity.

  • Methodology

    The course combines theoretical knowledge with practical examples and demonstrations to reinforce learning. You will also have access to supplementary resources, including reading materials and tools, to enhance your understanding and practical skills.

  • Target audience

    The course is designed for professionals and aspiring practitioners seeking to establish a solid foundation in information security. It is ideal for IT managers, system administrators, security analysts, and anyone responsible for protecting sensitive information and organizational assets.