it training


Course Objectives

  • Understand the business need for information security as well as the threats posed and the more common attacks associated with those threats
  • Differentiate threats to the data and attacks against the system
  • Differentiate between laws and ethics and become acquainted with the regulations that related to the practice of information security
  • Define risk management, risk identification, risk control and how to maintain and perpetuate risk controls
  • Describe management’s role in the development, maintenance, and enforcement of information security policy, standards, practices, procedures, and guidelines
  • Understand the role of physical design in the implementation of a comprehensive security plan
  • Describe the basic principles of cryptography
  • Understand how an organisation’s information security blueprint becomes a project plan
  • Understand how to build readiness and review procedures into information security maintenance

DMC Firewall is a Joomla Security extension!