|Date||:||Fri, 22 Sep 2017 - Fri, 22 Sep 2017||Last Date of Registration||:||Thu, 21 Sep 2017|
|No. of Classes/ Sessions||:||1||Total Hours||:||8 Hours|
|Category||:||Information Security & Audit|
Start Date: Fri, 22 Sep 2017
Last Date of Registration: Thu, 21 Sep 2017
Training Fee: 3000.00
Vanue: Bangladesh Skill Development Institute (BSDI) House# 2B, Road#12, Mirpur Road, Dhanmondi, Dhaka 1209, Bangladesh
Individuals who require a fundamental level understanding and practical experience and training for Information Security. This course is intended for Secure System Configuration and Countermeasures. All other staff involved in delivering IT services Professionals who work for legitimate Organization
Lecture,Practical exercise and evaluation, Evaluation: Classroom attendance, regular participation in the class, practical exercise,
The need for more effective information security practices is increasingly evident with each security breach reported in the media.The major challenge for businesses is the complexity of security requirements due to changing hacking tactics, myriad security vulnerabilities, evolving business practices, new business technologies, and emerging security technologies. Those numerou organization specific security challenges are best solved by professionals with Ensuring effectiveness of the enterprise security architecture should be verified on a regular basis. This represents a great challenge for increasingly sophisticated organizations due to complex IT environments which include security solutions, end-user awareness, policies, and new technologies.
Outcome of the Course:
Upon completion, participants will be able to demonstrate knowledge and understanding about the Information Security and its implementation in their working area that if correctly adopted and adapted will help an organization create a more structured value-add and secure their IT infrastructure.
1. Being a Hacker
- Who is a Hacker?
- Why People Hack?
- What people Hack?
- What is information?
- How much worth my Information is?
- Types of Hackers
- Approach of a Hacker
- Steps in Hacking
2. Cybersecurity Testing and Auditing Methodologies
- Information gathering
- Vulnerability Assessment
3. Basics of Internet, Networking & Application’s Security Testing
- What is a Network?
- Types of network – LANs, WANs & WLANs
- What is Internet?
- History of the Internet
- Basic Structure
- Web Application Scanning and Penetration Testing
- OWASP Top 10 Vulnerabilities
4. Cyber Security and Legal Compliance
- HIPPA Checklist
- FERPA Checklist
- PCI DSS
- PCI DSS Checklist