ICT security for Administrators
Training for: IT Network Administrators, Security Officers and Information Security Administrators. – more
ICT security for Users
Training for Users of Teleinformatic Networks. – more
A written request to qualify a candidate for training should be sent to the following address:biuro@ikmj.com
ICT security for Administrators
Participant profile:
Training for:
- Administrators of Teleinformatic Networks,
- Security Officers,
- Information Security Administrators.
Training description:
Lectures and a seminar interspersed with practical exercises closely related to the level of participants’ needs.
Trainers:
The training is conducted by the Line Staff of the Institute’s Security Group.
Training schedule
Day 1 – Seminar:
- The current information security situation
- Security issues of ICT systems
- Methods and means of protecting information:
- Technical
- Software
- Backup and redundancy
- Cryptography and information encryption
- Physical means of protection and defense
- Organizational measures
- Building information security systems, comprehensive approach
Day 2 Seminar and exercises:
- Attacks
- Current attack directions
- Attack tools
- Penetration Testing
- Search for and exploit security holes
- Building effective ICT security systems
- Incident tracking and incident response:
- first reaction to an incident
- data collection
- data analysis
- reports on the investigation (causes, effects, vulnerabilities, security, recommendations)
- Corrective actions
The order of classes depends on the teacher.
Training time:
Option I: 2 days
Option II: 1 day
During the training (applies to open training): 2-3 coffee breaks and lunch
ICT security for Users
Attendee profile:
- Training for Users of Teleinformatic Networks.
Training description:
Lectures and a seminar interspersed with practical exercises closely related to the level of participants’ needs.
Trainers:
The training is conducted by the Line Staff of the Institute’s Security Group.
Training schedule
Day 1 of the seminar – discussion on practical examples:
- Topicality of the ICT security problem
- Main concepts / terms in the field of ICT security
- IT security threats and protection mechanisms:
- signs of attacks
- attack detection methods
- response mechanisms
- security mechanisms
- Your responsibilities to ensure information security
- Documents that regulate the responsibilities and actions of users
The order of classes depends on the teacher.
Training time:
1 Day
During the training (applies to open training): 2-3 coffee breaks and lunch