Information Security Fundamentals: Data Protection Technologies
Course ID : UEC-004
Duration In-class (в days) : 3 days
Duration Online : 3 days
Сurriculum : in-class, Virtual Instructor-Led Training - ONLINE
Overview
The course is devoted to technical means of ensuring information security. The main types of attacks, methods of protection against them, the choice of software and hardware solutions in the field of information security are considered.
Much attention is paid to practical work.
Audience for this course
The course is intended for specialists of information security departments and information technology services responsible for data protection.
Objective
Students will acquire knowledge and practical skills in ensuring the information security of modern IT infrastructure and applications, learn to identify typical attacks and counteract them.
Prerequisites for this course
Basic Windows and Linux OS administration skills. Basic knowledge of network technologies.
Outcomes
Upon completion of the course, students will gain the knowledge and skills to:
- Choose the best technical means of protecting the network infrastructure, server workstations and applications.
- Understand the tactics and methods of action of violators and counteract them
- Detect attacks and mitigate their consequences
- Ensure security when working remotely and prevent information leaks
- Protect modern IT infrastructures using containers, microservices, and virtualization technologies.
Outline
- Ensuring the security of the network infrastructure
- Ensuring the security of operating systems and basic services
- Threats for web applications and protection against them
- Protecting the virtualization environment and container execution infrastructure
- Ways to ensure secure remote work and protection of mobile devices
- Organization of centralized management of user accounts and access rights
- Data leakage prevention systems
- Security of the Internet of things (IoT) and peripheral computing (Edge Computing)
- Attack detection, security event management (SEIM) and user behavior analysis (UBA) systems
- Means for assessing the security of information systems