Information Security Fundamentals: Data Protection Technologies

Course ID : UEC-004

Duration In-class (в days) : 3 days

Duration Online : 3 days

Сurriculum : in-class, Virtual Instructor-Led Training - ONLINE

Overview

The course is devoted to technical means of ensuring information security. The main types of attacks, methods of protection against them, the choice of software and hardware solutions in the field of information security are considered.

Much attention is paid to practical work.

Audience for this course

The course is intended for specialists of information security departments and information technology services responsible for data protection.

Objective

Students will acquire knowledge and practical skills in ensuring the information security of modern IT infrastructure and applications, learn to identify typical attacks and counteract them.

Prerequisites for this course

Basic Windows and Linux OS administration skills. Basic knowledge of network technologies.

Outcomes

Upon completion of the course, students will gain the knowledge and skills to:

  • Choose the best technical means of protecting the network infrastructure, server workstations and applications.
  • Understand the tactics and methods of action of violators and counteract them
  • Detect attacks and mitigate their consequences
  • Ensure security when working remotely and prevent information leaks
  • Protect modern IT infrastructures using containers, microservices, and virtualization technologies.

Outline

  1. Ensuring the security of the network infrastructure
  2. Ensuring the security of operating systems and basic services
  3. Threats for web applications and protection against them
  4. Protecting the virtualization environment and container execution infrastructure
  5. Ways to ensure secure remote work and protection of mobile devices
  6. Organization of centralized management of user accounts and access rights
  7. Data leakage prevention systems
  8. Security of the Internet of things (IoT) and peripheral computing (Edge Computing)
  9. Attack detection, security event management (SEIM) and user behavior analysis (UBA) systems
  10. Means for assessing the security of information systems
Обучение и сертификация в различных областях информационных технологий по продукции и технологиям мировых лидеров ИТ-рынка
Невский пр, дом 173, литер А
Санкт-Петербург
Санкт-Петербург
Россия
+7 (812) 611-15-75