Unlocking Information Security: Part Two Training Logo

Unlocking Information Security: Part Two Training

Live Online & Classroom Enterprise Training

A Basic Security Awareness Guide on Information Security & Internet Security to Keep Online and Offline Devices Safe!

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is Unlocking Information Security: Part Two Training about?

In this course, which is the second part of the Unlocking Information Security program, you will turn your attention to the Internet: you'll start by learning about the inherent vulnerabilities lurking in the multiple layers of the Internet's protocol stack then meet the first line of internet defences. Next, you'll take an in-depth look at the modern cryptographic concepts at the core of internet security and discover the mathematical miracle that makes them possible. 

With all this in mind, you will take a deep survey of the world wide web; understand the various technologies behind websites, how web servers and web browsers interact, how they can be attacked, and how they should be defended. Finally, you will learn about viruses, worms and trojans: what they are, how they spread, hide, and attack, and the arms race between them and the anti-virus industry. 

What are the objectives of Unlocking Information Security: Part Two Training ?

  • An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and proper defences against them like NAT Boxes and Firewalls 
  • An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital 
  • Signatures and MAC 
  • A survey of the world wide web’s security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable, or is there a silver lining? 

Who is Unlocking Information Security: Part Two Training for?

  • Non-Techies Wanting to Learn About Information Security 
  • Business & IT Managers Needing a Working Knowledge of Information Security 
  • Aspiring & Inexperienced IT Professionals 
  • This Course Is NOT for Seasoned & Experienced IT & Cyber Security Professionals 

What are the prerequisites for Unlocking Information Security: Part Two Training?

None

Available Training Modes

Live Online Training

22 Hours

Self-Paced Training

22 Hours

Who is the instructor for this training?

The trainer for this Unlocking Information Security: Part Two Training has extensive experience in this domain, including years of experience training & mentoring professionals.

Reviews