Course Overview
Computer and information security is of utmost importance in today’s technological (and political?) environment. The threats imposed by viruses, Trojan horses and other software malware is well known, as is the problem of the hackers – both those programmers who breaks into computer systems because of the challenge imposed and those who break in for criminal or terrorist purposes – to steal, change or destroy information.
In this “anti-hacker” course, participants learn about the basic threats hackers pose and what is needed in order to protect computer systems from them.
Who should attend?
Anyone who needs to learn about anti-hacking techniques.Prerequisite:
Understanding computer software and architecture.
Course Outline:
1. Introduction
- What’s there to worry about
2. Organizational Threats
- Users
- Host
- Server
- Perimeter
3. Defense Methodologies
- Defense in depth
- IATF
- ISSE
- Technology environment defined
4. Defense Tools
- Users
- Host
- Server
- Perimeter
5. Security Assessment Demonstration
- Concepts
- Tools
6. Summary