Course Overview
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.
Target audiences
- Network security and information security professionals seeking to manage network security
- Managers or consultants seeking to master network security best practices
- Individuals involved in the planning and implementation of the architectural aspects of network security
- Technical experts seeking to enhance their network security knowledge
- Network security expert advisors
Schedule Dates
Curriculum
-
Course agenda
- Day 1: Introduction to ISO/IEC 27033 series of standards and initiation of network security implementation
- Day 2: Network security team, policy, risk management, and documentation management
- Day 3: Internet access services, network segmentation, securing network communications using security gateways, VPNs, and wireless IP network access
- Day 4: Network security testing, incident management, monitoring, and continual improvement
- Day 5: Certification exam