|Workshop Date||Fri, 16 Jun 2017 - Fri, 16 Jun 2017||Last Date of Registration||Tue, 13 Jun 2017||Online Registration|
Start Date: Fri, 16 Jun 2017
Last Date of Registration: Tue, 13 Jun 2017
Course Fee: 5000.00
Vanue: 225 A. K. Tower (1st Floor), SK Mujib Road, Chowmohuni, Chittagong, Bangladesh
Individuals who require a fundamental level understanding and practical experience and training for Information Security. This course is intended for Secure System Configuration and Countermeasures. All other staff involved in delivering IT services Professionals who work for legitimate Organization
Lecture,Practical exercise and evaluation, Evaluation: Classroom attendance, regular participation in the class, practical exercise,
The need for more effective information security practices is increasingly evident with each security breach reported in the media.The major challenge for businesses is the complexity of security requirements due to changing hacking tactics, myriad security vulnerabilities, evolving business practices, new business technologies, and emerging security technologies. Those numerou organization specific security challenges are best solved by professionals with Ensuring effectiveness of the enterprise security architecture should be verified on a regular basis. This represents a great challenge for increasingly sophisticated organizations due to complex IT environments which include security solutions, end-user awareness, policies, and new technologies.
This workshop will immerse IT resource users into an interactive environment where they will acquire fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learnt from the training helps IT systems users to take the necessary steps to mitigate their security exposure.
Outcome of the Course:
Upon completion, participants will be able to demonstrate knowledge and understanding about the Information Security and its implementation in their working area that if correctly adopted and adapted will help an organization create a more structured value-add and secure their IT infrastructure.
1. Being a Hacker
- Who is a Hacker?
- Why People Hack?
- What people Hack?
- What is information?
- How much worth my Information is?
- Types of Hackers
- Approach of a Hacker
- Steps in Hacking
2. Cybersecurity Testing and Auditing Methodologies
- Information gathering
- Vulnerability Assessment
3. Basics of Internet, Networking & Application’s Security Testing
- What is a Network?
- Types of network – LANs, WANs & WLANs
- What is Internet?
- History of the Internet
- Basic Structure
- Web Application Scanning and Penetration Testing
- OWASP Top 10 Vulnerabilities
4. Cyber Security and Legal Compliance
- HIPPA Checklist
- FERPA Checklist
- PCI DSS
- PCI DSS Checklist