Date : Fri, 22 Sep 2017 - Fri, 22 Sep 2017 Last Date of Registration : Thu, 21 Sep 2017
No. of Classes/ Sessions : 1 Total Hours : 8 Hours
Duration : 1 Day Time : 9AM-5PM
Category : Information Security & Audit
Resource Person
Md. Mushfiqur Rahman

View Profile
Associate Resource Person

Training Details

Start Date: Fri, 22 Sep 2017
Last Date of Registration: Thu, 21 Sep 2017
Training Fee: 3000.00
Vanue: Bangladesh Skill Development Institute (BSDI) House# 2B, Road#12, Mirpur Road, Dhanmondi, Dhaka 1209, Bangladesh


Who Can Attend?

Individuals who require a fundamental level understanding and practical experience and training for Information Security. This course is intended for Secure System Configuration and Countermeasures. All other staff involved in delivering IT services Professionals who work for legitimate Organization

Methodology

Lecture,Practical exercise and evaluation, Evaluation: Classroom attendance, regular participation in the class, practical exercise,

Workshop on Cyber Security Testing and Auditing Methodology
Objective of this Training

The need for more effective information security practices is increasingly evident with each security breach reported in the media.The major challenge for businesses is the complexity of security requirements due to changing hacking tactics, myriad security vulnerabilities, evolving business practices, new business technologies, and emerging security technologies. Those numerou organization specific security challenges are best solved by professionals with Ensuring effectiveness of the enterprise security architecture should be verified on a regular basis. This represents a great challenge for increasingly sophisticated organizations due to complex IT environments which include security solutions, end-user awareness, policies, and new technologies.


Training Overview & Outline

Outcome of the Course: 

Upon completion, participants will be able to demonstrate knowledge and understanding about the Information Security and its implementation in their working area that if correctly adopted and adapted will help an organization create a more structured value-add and secure their IT infrastructure.

Course Contents:
1. Being a Hacker

  • Who is a Hacker?
  • Why People Hack?
  • What people Hack?
  • What is information?
  • How much worth my Information is?
  • Types of Hackers
  • Approach of a Hacker
  • Steps in Hacking

2. Cybersecurity Testing and Auditing Methodologies

  •  Information gathering
  • Scanning
  • Vulnerability Assessment
  • Enumeration
  • Penetration

3. Basics of Internet, Networking & Application’s Security Testing

  • What is a Network?
  • Types of network – LANs, WANs & WLANs
  • What is Internet?
  • History of the Internet
  • Basic Structure
  • Web Application Scanning and Penetration Testing
  • OWASP Top 10 Vulnerabilities

4. Cyber Security and Legal Compliance

  • HIPPA
  • HIPPA Checklist
  • FERPA
  • FERPA Checklist
  • PCI DSS
  • PCI DSS Checklist
Registration