System Security Audit

Share on facebook
Share on google
Share on twitter
Share on linkedin

Main Topics

  • Openness and threat definitions
  • Open source vulnerability scanners and their use
  • Extract the topology of a network
  • Border systems inspection
  • Windows control
  • Control of Unix / Linux systems
  • Who Can Participate

Information technology auditors, information security experts who want to increase their knowledge of system security audits, and system and network administrators who want to prepare the security audit logic and systems for such audits

Basic network knowledge, operating systems knowledge (Windows and Unix) to recognize border security structures

Experience to be Obtained at the End of Education
Trainees will learn how to use vulnerability scanners, control operating systems, border systems and web applications.

Duration: 4 days