Tel:
(+234) 8038437312, 8023262908. E-mail: training@coinmac.org
Our Offices and Locations:
Nigeria, London, India, USA, United Kingdom, UAE & Canada

COINMAC INTERNATIONAL INC
Management Consultant
Multi-disciplinary Trainer
Information Technology Solution Provider

Home Contact Us
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac
Coinmac

DONWLOAD OUR COMPANY PROFILE
Course List
Media/Downloads
Join us on facebook
Registeration for: CYBER SECURITY AWARENESS & MANAGING SECURITY COURSE
Select Dates/Venues to attend
Personal Information
First Name:
Last Name:
Phone No:
E-mail:
Organization's Name:
Director of Org.:
AFTER MAKING PAYMENT, YOU CAN COME BACK TO THIS PAGE AND FILL THIS SECTION BELOW
PAYMENT VERIFICATION FORM
Teller No/Transaction ID:
Amount Paid:
Reg No:
CYBER SECURITY AWARENESS & MANAGING SECURITY COURSE
Category: AVIATION COURSES
COURSE FEE: USA:$3900 S/Africa, Ghana and African Countries: £2400 UK, UAE, Malaysia, India, Cairo,Istabul: £2600

ABOUT THE COURSE

The World Wide Web and the Internet are fantastic places to converse, conduct business, do research, or simply relax and play a few games. But unfortunately, it's also a place where some individuals would like to create havoc by committing fraud, identity theft, robbery, or to commit more serious crimes such as terrorism. This course looks at the world of Cyber security by examining the types of attacks these ner-do-wells use breach organisational defences and compromise systems.

The course then takes a high-level look at how organisations can protect against such attacks by describing how to build, operate and maintain a comprehensive set of security controls.

This course will provide you with an introduction to cyber security, hackers, hacking techniques and terminology.

Objectives

At the end of this course participants will be able to:

  • Describe the threats faced by organisations and individuals by hackers
  • Define the different classifications of Malware
  • Describe what DoS and DDos attacks are
  • Describe the stages of a hacking attack, including footprinting, social engineering, port scanning, network sniffing, and more.
  • Describe the basics of Information Security and how to build an Information Security Management System (ISMS)
  • Describe how to deploy Information Security controls within a network to defend against attack

COURSE CONTENT

Day 1 

  • Computing Foundation, Data Storage and Memory
  • OSI Protocol Stack
  • TCP/IP

Day 2 

  • Network Architecture
  • Internet Primer
  • Network Security
  • Modern Communications
  • Virtualisation & Cloud Technologies

Day 3 

  • Protective Monitoring
  • Common Methods of Attack
  • Encryption
  • Knowledge check, scenario exercise questions based upon days 1 - 3 delivery.

 

Day 4 

  • Cyber and the Legal Framework
  • Digital Footprints
  • Information Assurance
  • Risk Management and Risk Treatment
  • Risk Treatment - Identify the ways of treating risks, methods of gaining assurance, understanding the nature of residual risk, collecting evidence that supports decisions, risk management decisions.
  • Physical Security
  • Personnel Security

 

Day 5 

  • Service Assurance & Standards
  • Software Security Assurance
  • Secure Development Process
  • Threat Modelling
  • STRIDE: Risk Mitigation
  • Security Best Practice
  • Introduction to Security Architecture 
  • Knowledge check, scenario exercise questions based upon days 4 - 5 delivery.

 

DATES:

03 Sep - 07 Sep, 2018,
15 Oct - 19 Oct, 2018,
26 Nov - 30 Nov, 2018,
04 Feb - 08 Feb, 2019

IMPORTANT NOTE:

FOR MORE DETAILS WITH RESPECT TO COURSE CONTENT E.T.C, PLEASE SEND YOUR REQUEST TO training@coinmac.org or call +2348023262908,+2348038437312
PARTNERS
Our Products and Services
SSCEPASS4SURE
SSCEPASS4SURE
SSCEPASS4SURE
SSCEPASS4SURE
SSCEPASS4SURE
SSCEPASS4SURE
HUSIS
MEDICALHEALTH
SCHOOLFEES
RESULT WIZARD
EASYSCHOOL
SCHOOLPORTAL
BULKSMS
JAMBCBT
Enquire Now Testimonials FAQS REGISTER NOW