design and implementation of the security policy according to iso/iec

Transkrypt

design and implementation of the security policy according to iso/iec
Szkolenie Compendium CE
DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY
ACCORDING TO ISO/IEC 17799 NORM
Strona 1 z 3
Szkolenie: Compendium CE
DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY
ACCORDING TO ISO/IEC 17799 NORM
CENA
W celu przeprowadzenia kalkulacji ceny tego szkolenia prosimy o kontakt z działem handlowym
INFORMACJE DODATKOWE
Czas trwania szkolenia
Lokalizacje
3 dni
Kraków - ul. Tatarska 5, II piętro, godz. 9:00 - 16:00
Warszawa - ul. Bielska 17, godz. 9:00 - 16:00
OPIS SZKOLENIA
Get familiar with security policy design and implementation techniques according to European norm ISO/IEC 17799. The correct
security policy design was always a controversial problem. First normalization approach was taken by IETF in form of RFC 2196. It
was an interesting but purely network approach to the security policy. The introduction of British BS-7799 norm was a real
breakthrough, that covered all aspects of information security in organizations. Course covers also practical knowledge on network
treats and efficient methods to protect network resources. Course is lead as seminar interspersed with practical exercises. Because
course has a substantial workshop part the division between three days is not fixed - it depends very much on the students skills.
PLAN SZKOLENIA
- Introduction
- Basic definitions
- Security policy
- Security organization
- Asset classification and control
- Personnel security
- Physical and environmental security
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie Compendium CE
DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY
ACCORDING TO ISO/IEC 17799 NORM
Strona 2 z 3
- Communication and operation management
- Access control
- Business continuity management
- System development and management
- Compliance
Workshop agenda:
- Secure configuration of Linux, Windows, 9x, NT, 2000
- Data encryption
- Hacker attack methods:
- Reconnaissance
- Port scanning
- Enumeration
- Sniffer-administrators and hacker tools
- Firewall configuration
- Network and system scanners
- Intrusion detection systems
- Antivirus systems
- e-mail scanning
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028
Szkolenie Compendium CE
DESIGN AND IMPLEMENTATION OF THE SECURITY POLICY
ACCORDING TO ISO/IEC 17799 NORM
Strona 3 z 3
- Remote access
WYMAGANIA DLA UCZESTNIKA
Basic Windows 2000 and Linux knowledge. Practical knowledge on IP, TCP, UDP, ICMP protocols and OSI model.
CERTYFIKATY
The participants will obtain certificates signed by Compendium - Education Center.
PROWADZĄCY
Compendium's trainer
Compendium Centrum Edukacyjne sp. z o.o.
ul. Tatarska 5, 30-103 Kraków, tel.: (12) 298 47 77
ul. Bielska 17, 02-394 Warszawa, tel.: (22) 417 41 70
Bank BPH Spółka Akcyjna
Oddział w Krakowie
Numer konta: 74 1060 0076 0000 3210 0022 6028