"People do not invest in education because they are rich. They become rich because they invest in education."


- Gabriel Verhoef

GIAC Information Security Fundamentals

GIAC Information Security Fundamentals candidates will learn and be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.

 

GIAC Information Security Fundamentals course offered at MasterGrade.

Who should attend?

Managers, Information Security Officers, and System Administrators who need an overview of risk management and defense in depth techniques. Anyone who writes, implements, or must adhere to policy, disaster recovery or business continuity.

GIAC Information Security Fundamentals (GISF) Certification

 

Lesson 1: Introduction to Information Security

  • Basics of Information Security
  • Information Classification
  • Evaluate a Risk Assessment
  • Identify and Evaluate Risk Mitigation Strategies

Lesson 2: Information Security Management Goals

  • Organizational Security
  • Security Program Development
  • The Application of Security Concepts
  • Conflict Management

Lesson 3: Security Architecture and Design

  • Security Models
  • Security Modes
  • System Assurance
  • Apply OODA Principles in Information Security

Lesson 4: Data Access Control Techniques and Attack Methods

  • Basics of Data Access Control Techniques
  • Data Access Control Attack Methods
  • System Access and Authentication

Lesson 5: Cryptography

  • Ciphers and Cryptography
  • Symmetric-Key Cryptography
  • Asymmetric-Key Cryptography
  • Public Key Infrastructure Systems
  • Hashing and Message Digests
  • Email, Internet, and Wireless Security
  • Cryptographic Weaknesses

Lesson 6: Exploring Application Security Concepts

  • Harden Operating Systems
  • Software Configuration Management
  • Software Controls
  • Database System Security

Lesson 7: Securing Web Applications

  • Prevent Input Validation Attacks
  • Protect Systems from Buffer Overflow Attacks
  • Implement ActiveX and Java Security
  • Protect Systems from Scripting Attacks
  • Implement Secure Cookies
  • Harden a Web Browser
  • Ecommerce Security Issues

Lesson 8: Network Security

  • Network Basics
  • The TCP/IP Protocol Suite
  • Common Data Network Services
  • WAN Technology
  • Network Threats
  • Harden Internetwork Connection Devices

Lesson 9: Hardening Network Servers and Services

  • Harden DNS and BIND Servers
  • Harden Web Servers
  • Harden DHCP Servers
  • Harden File and Print Servers
  • Harden Email Servers
  • Harden Conferencing and Messaging Servers
  • Harden FTP Servers
  • Harden Directory Services

Lesson 10: Securing Network Communications

  • Protect Network Traffic with IP Security (IPSec)
  • Secure Wireless Traffic
  • Secure the Network Telephony Infrastructure
  • Secure the Remote Access Channel

Lesson 11: Exploring Firewall Basics

  • Introduction to Firewalls
  • Firewall Architecture
  • Firewall Policies

Lesson 12: Monitoring the Security Infrastructure

  • Scan for Vulnerabilities
  • Monitor for Security Anomalies
  • Set Up a Honeypot
  • Prevent Intrusions

Lesson 13: Physical Security

  • Physical Access Control
  • Physical Access Monitoring
  • Physical Security Methods
  • Facilities Security

Lesson 14: Operations Security

  • Operations Security Control
  • Operational Threats and Violations
  • OPSEC Auditing and Monitoring

Lesson 15: Enforcing Organizational Security Policies

  • Enforce Corporate Security Policy Compliance
  • Enforce Legal Compliance
  • Enforce Physical Security Compliance
  • Ethical Codes in Information Security
  • Educate Users
  • Conduct a Security Audit
  • Create Information Security Program Evaluation Metrics
  • Assess a Perimeter Policy

Lesson 16: Business Continuity and Disaster Recovery Planning

  • Business Continuity Plan Fundamentals
  • BCP Implementation
  • Plan for Disaster Recovery

Lesson 17: Managing Security Incidents

  • Computer Crime Laws and Regulations
  • Evidence Administration
  • Respond to Security Incidents
  • Recover from a Security Incident

Duration:

Learning Materials:

Prerequisites:

What course next:

5 Days

All included

None

More Security Courses »
 

Get a Quote today »

 

Course Content
GIAC Information Security Fundamentals

   • Introduction to Information Security
   • Information Security Management Goals
   • Security Architecture and Design
   • Data Access Control Techniques and Attack Methods
   • Cryptography
   • Exploring Application Security Concepts
   • Securing Web Applications
   • Network Security
   • Hardening Network Servers and Services
   • Securing Network Communications

   • Monitoring the Security Infrastructure
   • Physical Security
   • Operations Security
   • Enforcing Organizational Security Policies
   • Business Continuity and Disaster Recovery Planning
   • Managing Security Incidents

 

Quick Search
Register Here

Fill in your details below and one of our career specialists will assist you with your study needs

Sorry, your message could not be sent. Please check your details. Please complete all fields.

Name

Email

Phone

Location

Message


Thank you
For your request, one of our career specialists will assist you with your study needs.

It’s very fun and interesting. Love It!!

Shaun2.jpg
- Shaun Brown

I will recommend MasterGrade IT to anyone that is serious about getting certification.

zaheer1.jpg
- Zaheer Isaacs

Very informative; Excel is a great course to start off with. I like the neat classrooms and the personal attention!

rene1.jpg
- René Leandro Borges

I enjoyed doing the course in my own time!

sadia.jpg
- Sadia Abrahams

Already Engaged.

Thousands of companies around the world use and love our training every day.


Meetup
Meetup
Meetup
Meetup
Meetup
Meetup
Meetup
Meetup

Procomp Computer Services CC trading as MasterGrade IT® Computer Learning Centre. Registration No. 2002/029621/23.