ICT safety

 

ICT security for Administrators

Training for: IT Network Administrators, Security Officers and Information Security Administrators. – more

ICT security for Users

Training for Users of Teleinformatic Networks. – more

 


 
A written request to qualify a candidate for training should be sent to the following address:biuro@ikmj.com

 

ICT security for Administrators

Participant profile:

Training for:

  • Administrators of Teleinformatic Networks,
  • Security Officers,
  • Information Security Administrators.

Training description:

Lectures and a seminar interspersed with practical exercises closely related to the level of participants’ needs.

Trainers:

The training is conducted by the Line Staff of the Institute’s Security Group.

Training schedule

Day 1 – Seminar:

  • The current information security situation
  • Security issues of ICT systems
  • Methods and means of protecting information:
    • Technical
    • Software
    • Backup and redundancy
    • Cryptography and information encryption
    • Physical means of protection and defense
    • Organizational measures
  • Building information security systems, comprehensive approach
Day 2 Seminar and exercises:

  • Attacks
    • Current attack directions
    • Attack tools
    • Penetration Testing
    • Search for and exploit security holes
  • Building effective ICT security systems
  • Incident tracking and incident response:
    • first reaction to an incident
    • data collection
    • data analysis
    • reports on the investigation (causes, effects, vulnerabilities, security, recommendations)
  • Corrective actions
The order of classes depends on the teacher.

Training time:

Option I: 2 days
Option II: 1 day

During the training (applies to open training): 2-3 coffee breaks and lunch

 

 

ICT security for Users

Attendee profile:

  • Training for Users of Teleinformatic Networks.

Training description:

Lectures and a seminar interspersed with practical exercises closely related to the level of participants’ needs.

Trainers:

The training is conducted by the Line Staff of the Institute’s Security Group.

Training schedule

Day 1 of the seminar – discussion on practical examples:

  • Topicality of the ICT security problem
  • Main concepts / terms in the field of ICT security
  • IT security threats and protection mechanisms:
    • signs of attacks
    • attack detection methods
    • response mechanisms
    • security mechanisms
  • Your responsibilities to ensure information security
  • Documents that regulate the responsibilities and actions of users
The order of classes depends on the teacher.

Training time:

1 Day

During the training (applies to open training): 2-3 coffee breaks and lunch