Security Controls
Identify, Implement Security Controls and understand the role of technologies in strengthening security.
Code: FOREOCON80, Available until ...
Introduction
Information Assets
Information Security objectives (CIA)
Types of security controls
Physical Security
Identity and Access Management (IAM): Concepts
Identity and Access Management (IAM): Components
Firewall, DMZ and WAF
Network segmentation
Intrusion Prevention System (IPS)
Encryption: Symmetric and Asymmetric methods
Encryption: Hybrid method
Encryption: Digital signature and Hashing
Encryption: Illustrative scenario
Encryption: Virtual Private Network (VPN)
Encryption: HTTPS/SSL
Encryption: Data at rest
Encryption: Keys and Certificates Management (PKI, HSM,...)
Security Training and Awareness
Hardening
Data Loss Prevention (DLP)
Intrusion Detection System (IDS)
Security Information and Event Management (SIEM)
Vulnerability Assessment
Application security
Security audits and Penetration Testing
Configuration Management
Incident Response
Patch Management
Anti-malware and Endpoint security
Recovery controls