design and implementation of the security policy according to iso/iec
Transkrypt
design and implementation of the security policy according to iso/iec
Szkolenie Compendium CE DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY ACCORDING TO ISO/IEC 17799 NORM Strona 1 z 3 Szkolenie: Compendium CE DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY ACCORDING TO ISO/IEC 17799 NORM CENA W celu przeprowadzenia kalkulacji ceny tego szkolenia prosimy o kontakt z działem handlowym INFORMACJE DODATKOWE Czas trwania szkolenia Lokalizacje 3 dni Kraków - ul. Tatarska 5, II piętro, godz. 9:00 - 16:00 Warszawa - ul. Bielska 17, godz. 9:00 - 16:00 OPIS SZKOLENIA Get familiar with security policy design and implementation techniques according to European norm ISO/IEC 17799. The correct security policy design was always a controversial problem. First normalization approach was taken by IETF in form of RFC 2196. It was an interesting but purely network approach to the security policy. The introduction of British BS-7799 norm was a real breakthrough, that covered all aspects of information security in organizations. Course covers also practical knowledge on network treats and efficient methods to protect network resources. Course is lead as seminar interspersed with practical exercises. Because course has a substantial workshop part the division between three days is not fixed - it depends very much on the students skills. PLAN SZKOLENIA - Introduction - Basic definitions - Security policy - Security organization - Asset classification and control - Personnel security - Physical and environmental security Compendium Centrum Edukacyjne sp. z o.o. ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77 ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70 Bank BPH Spółka Akcyjna Oddział w Krakowie Numer konta: 74 1060 0076 0000 3210 0022 6028 Szkolenie Compendium CE DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY ACCORDING TO ISO/IEC 17799 NORM Strona 2 z 3 - Communication and operation management - Access control - Business continuity management - System development and management - Compliance Workshop agenda: - Secure configuration of Linux, Windows, 9x, NT, 2000 - Data encryption - Hacker attack methods: - Reconnaissance - Port scanning - Enumeration - Sniffer-administrators and hacker tools - Firewall configuration - Network and system scanners - Intrusion detection systems - Antivirus systems - e-mail scanning Compendium Centrum Edukacyjne sp. z o.o. ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77 ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70 Bank BPH Spółka Akcyjna Oddział w Krakowie Numer konta: 74 1060 0076 0000 3210 0022 6028 Szkolenie Compendium CE DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY ACCORDING TO ISO/IEC 17799 NORM Strona 3 z 3 - Remote access WYMAGANIA DLA UCZESTNIKA Basic Windows 2000 and Linux knowledge. Practical knowledge on IP, TCP, UDP, ICMP protocols and OSI model. CERTYFIKATY The participants will obtain certificates signed by Compendium - Education Center. PROWADZĄCY Compendium's trainer Compendium Centrum Edukacyjne sp. z o.o. ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77 ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70 Bank BPH Spółka Akcyjna Oddział w Krakowie Numer konta: 74 1060 0076 0000 3210 0022 6028