The participant will be able to describe the importance of and requirements for information security focusing on confidentiality, integrity, and availability of information. They will be able define various types of attacks, and how they’re spread and executed, evaluate and implement methods available to protect information systems, including operating system features and utilities
Participants shall design secure network topologies utilizing physical security, firewalls, VPNs, and other protection features, as well monitor and log activity on computers and networks using intrusion detection and prevention systems
They can evaluate common open source and commercial security applications and apply research skills to identify and correct potential security vulnerabilities
Requirements
A basic exposure to Security concepts may help but is not required for this training program.