fbpx

(+971) 58 674 7427

دبي، ديرة، مركز واصل للأعمال، طابق 7، مكتب 701

DURATION

5 DAYS

Date

FROM 05 TO 09 MARCH

Location

THE H HOTEL ***** / DUBAI

Course Fees

4600 $

The price includes

The cost of the trainer Cost
A Training Hall in a five-star hotel ( including breakfast and an open buffet for lunch)
Certificate From Ivan ILLICH and The professional diploma International Certificate

Training Overview

Train to become a computer systems security professional and gain a solid understanding of programming, operating systems, networking and strategy — using practical applications of defensive and offensive technologies.

With technology being a ubiquitous aspect of our everyday lives, computer and system security play a critical role in protecting users and organizations from cyber attacks. When the systems work, our data is protected and secure, but when they fail, it can be catastrophic. Businesses know they need systems in place to ensure the security of their data, and nation-states are focused on the security of their people.

The Information Systems Security program prepares you for entering the computer system security field with confidence and solid fundamental knowledge. You will use a wide variety of defensive and offensive tools while learning the fundamentals of networking, tool construction, and operating systems.

the program delivers a strong base of fundamental skills in programming, operating systems, networking, and strategy. And  the more practical applications of defensive and offensive strategies

How you will benefit

  • Holding Certified Information Systems Auditor (CISA) certification confirms your ability to assess vulnerabilities, compliance, and instituting controls in an enterprise
  • Holding Certified Information Security Manager (CISM) certification demonstrates your knowledge of managing, assessing, designing, and overseeing enterprise information security functions
  • Holding Certified Information Security Professional (CISSP) certification showcases your skills in security and risk management, asset security, security architecture, and network security

Credential

  • Upon successfully completing this program, graduates will receive a SAIT Diploma in Information Systems Security. from Delaware City University, Washington, DC
  • A certificate issued by The Ivan Ilyich Training Institute, certified by the Knowledge and Human Development Authority

You will learn

  •  Module 1: Security and Risk Management

    • Understand, adhere to, and promote professional ethics
    • Understand and apply security concepts
    • Evaluate and apply security governance principles
    • Determine compliance and other requirements
    • Understand legal and regulatory issues that pertain to information security in a holistic context
    • Understand requirements for investigation types (i.e., administrative, criminal, civil, regulatory, industry standards)
    • Develop, document, and implement security policy, standards, procedures, and guidelines
    • Identify, analyze, and prioritize Business Continuity (BC) requirements
    • Contribute to and enforce personnel security policies and procedures
    • Understand and apply risk management concepts
    • Understand and apply threat modelling concepts and methodologies
    • Apply Supply Chain Risk Management (SCRM) concepts
    • Establish and maintain a security awareness, education, and training program

     Module 2: Asset Security

    • Identify and classify information and assets
    • Establish information and asset handling requirements
    • Provision resources securely
    • Manage data lifecycle
    • Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))
    • Determine data security controls and compliance requirements
  •  Module 3: Security Architecture and Engineering

    • Research, implement and manage engineering processes using secure design principles
    • Understand the fundamental concepts of security models (e.g., Biba, Star Model, Bell-LaPadula)
    • Select controls based upon systems security requirements
    • Understand security capabilities of Information Systems (IS) (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption)
    • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
    • Select and determine cryptographic solutions
    • Understand methods of cryptanalytic attacks
    • Apply security principles to site and facility design
    • Design site and facility security controls
  • Module 4: Communication and Network Security

    • Assess and implement secure design principles in network architectures
    • Secure network components
    • Implement secure communication channels according to design

     Module 5: Identity and Access Management (IAM)

    • Control physical and logical access to assets
    • Manage identification and authentication of people, devices, and services
    • Federated identity with a third-party service
    • Implement and manage authorization mechanisms
    • Manage the identity and access provisioning lifecycle
  •  Module 6: Security Assessment and Testing

    • Design and validate assessment, test, and audit strategies
    • Conduct security control testing
    • Collect security process data (e.g., technical and administrative)
    • Analyze test output and generate report
    • Conduct or facilitate security audits

     Module 7: Security Operations

    • Understand and comply with investigations
    • Conduct logging and monitoring activities
    • Perform Configuration Management (CM) (e.g., provisioning, baselining, automation)
    • Apply foundational security operations concepts
    • Apply resource protection
    • Conduct incident management
    • Operate and maintain detective and preventative measures
    • Implement and support patch and vulnerability management
    • Understand and participate in change management processes
    • Implement recovery strategies
    • Implement Disaster Recovery (DR) processes
    • Test Disaster Recovery Plans (DRP)
    • Participate in Business Continuity (BC) planning and exercises
    • Implement and manage physical security
    • Address personnel safety and security concerns
  •  Module 8: Software Development Security

    • Understand and integrate security in the Software Development Life Cycle (SDLC)
    • Identify and apply security controls in software development ecosystems
    • Assess the effectiveness of software security
    • Assess security impact of acquired software
    • Define and apply secure coding guidelines and standards

OUR PARTNERS

Register with us now

Register with us now and get the latest offers and discounts available in our cradle. After entering your information and registering successfully, one of our educational consultants will contact you to help you complete the registration process and to answer all your inquiries.

Credentials

. Upon successful completion of this programme, graduates will receive a SAIT Diploma in Information Systems Security. from the University of Delaware City, Washington, D.C

. A certificate issued by the Ivan Ilyich Training Institute, certified by the Knowledge and Human Development Authority

ديرة، مركز واصل للأعمال،طابق 7، مكتب 701

info@ ivanillichinstitute.com

(+971) 58 674 7427