Advanced Level

Penetration Test

Main Topics Definition of pentest, purpose, issues to be considered External network scans and active information gathering Discovery and vulnerability scanning Exploitation Domain and end user computers penetration tests Things to do after abuse (post-exploitation) Database penetration tests Network components penetration tests and second layer attacks Security mechanisms circumvention methods – Social engineering Web applications …

Penetration Test Read More »

IT Law Education

Main Topics Basic training in conducting the judicial process Computer technology Digital data technology Operating system and software Internet technology Network security for clients Wireless internet access and security Information culture Internet search engines Interactive banking and penalty Information crimes-Law articles Electronic signature Cyber crimes-case studies Insulting-swearing crimes (such as internet-sms) Expert reports Domain names …

IT Law Education Read More »

Critical Infrastructure Protection

Main Topics Critical infrastructure definition and critical infrastructure sectors Information systems used in critical infrastructures Corporate Information Systems and Industrial Control Systems Similarities and differences Critical infrastructure topologies and risk analysis Critical infrastructures and information security incidents Major vulnerabilities, threats and countermeasures in critical infrastructures Physical security / information security integration Managing information security Standards …

Critical Infrastructure Protection Read More »

Business Continuity / Disaster Recovery Planning

Main Topics Principles regarding the management of the business continuity project Threats that can affect any organization Risk assessment and determination of necessary controls How to do business impact analysis Development of business continuity management strategies How to prepare for emergency response and determination of relevant activities, and what to do in case of an …

Business Continuity / Disaster Recovery Planning Read More »

Windows Security

Main Topics Windows operating system security IPSec, PKI (Public Key Infrastructure) and EFS (Encrypting File System) ‘Powershell’ development in Windows environment Who Can Participate Windows network administrators, Microsoft Active Directory administrators Those planning a secure transition to Microsoft systems, Those interested in security in Microsoft systems Prerequisites Basic knowledge of Windows and networking Experience to …

Windows Security Read More »

Linux Security

Main Topics Safe installation Boot services configuration Configuring the kernel securely File system access control User access control Keeping system records Security monitoring tools Security tightening tools Scripting for security purposes Who Can Participate Who Can Participate Security professionals who want to secure Linux-based systems, system administrators who research how to secure Linux-based Internet applications …

Linux Security Read More »

System Security Audit

Main Topics Openness and threat definitions Open source vulnerability scanners and their use Extract the topology of a network Border systems inspection Windows control Control of Unix / Linux systems Who Can Participate Information technology auditors, information security experts who want to increase their knowledge of system security audits, and system and network administrators who …

System Security Audit Read More »