GIAC Information Security Fundamentals

Apply now for our GIAC Information Security Fundamentals Course



  • Introduction to Information Security
  • Information Security Management Goals
  • Security Architecture and Design
  • Data Access Control Techniques and Attack Methods
  • Cryptography


Course Details and Pricing


Instructor Led Learning


  Duration: 5 Days

  Registration Open Now!

Video Learning


  Duration: 5 Days

  Registration Open Now!

Call us : 021 419 3213

GIAC Information Security Fundamentals overview

GIAC Information Security Fundamentals Course overview


GIAC Information Security Fundamentals candidates will learn and be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.

GIAC Information Security Fundamentals Course capetown south africa

Who should attend?

Managers, Information Security Officers, and System Administrators who need an overview of risk management and defense in depth techniques. Anyone who writes, implements, or must adhere to policy, disaster recovery or business continuity.

Microsoft Project 2013 Course capetown south africa

About This Course

GISF candidates will learn and be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy.

3 Steps to Master GIAC Information Security Fundamentals

01

Take a
course

02

Write an
Exam

03

Get
Certified

What you will learn
GIAC Information Security Fundamentals Training

  • Course Overview Full course outline
    • Lesson 1 :Introduction to Information Security
    • Lesson 2 :Information Security Management Goals
    • Lesson 3 :Security Architecture and Design
    • Lesson 4 :Data Access Control Techniques and Attack Methods
    • Lesson 5 :Cryptography
    • Lesson 6 :Exploring Application Security Concepts
    • Lesson 7 :Securing Web Applications
    • Lesson 8 :Network Security
    • Lesson 9 :Hardening Network Servers and Services
    • Lesson 10 :Securing Network Communications
    • Lesson 11 :Monitoring the Security Infrastructure
    • Lesson 12 :Physical Security
    • Lesson 13 :Operations Security
    • Lesson 14 :Enforcing Organizational Security Policies
    • Lesson 15 :Business Continuity and Disaster Recovery Planning
    • Lesson 16 :Managing Security Incidents

Full course outline
GIAC Information Security Fundamentals Training

Lesson 1: Introduction to Information Security

  • Basics of Information Security
  • Information Classification
  • Evaluate a Risk Assessment
  • Identify and Evaluate Risk Mitigation Strategies

Lesson 2: Information Security Management Goals

  • Organizational Security
  • Security Program Development
  • The Application of Security Concepts
  • Conflict Management

Lesson 3: Security Architecture and Design

  • Security Models
  • Security Modes
  • System Assurance
  • Apply OODA Principles in Information Security

Lesson 4: Data Access Control Techniques and Attack Methods

  • Basics of Data Access Control Techniques
  • Data Access Control Attack Methods
  • System Access and Authentication

Lesson 5: Cryptography

  • Ciphers and Cryptography
  • Symmetric-Key Cryptography
  • Asymmetric-Key Cryptography
  • Public Key Infrastructure Systems
  • Hashing and Message Digests
  • Email, Internet, and Wireless Security
  • Cryptographic Weaknesses

Lesson 6: Exploring Application Security Concepts

  • Harden Operating Systems
  • Software Configuration Management
  • Software Controls
  • Database System Security

Lesson 7: Introduction to Animation

  • Prevent Input Validation Attacks
  • Protect Systems from Buffer Overflow Attacks
  • Implement ActiveX and Java Security
  • Protect Systems from Scripting Attacks
  • Implement Secure Cookies
  • Harden a Web Browser
  • Ecommerce Security Issues

Lesson 8: Network Security

  • Network Basics
  • The TCP/IP Protocol Suite
  • Common Data Network Services
  • WAN Technology
  • Network Threats
  • Harden Internetwork Connection Devices

Lesson 9: Hardening Network Servers and Services

  • Harden DNS and BIND Servers
  • Harden Web Servers
  • Harden DHCP Servers
  • Harden File and Print Servers
  • Harden Email Servers
  • Harden Conferencing and Messaging Servers
  • Harden FTP Servers
  • Harden Directory Services

Lesson 10: Securing Network Communications

  • Protect Network Traffic with IP Security (IPSec)
  • Secure Wireless Traffic
  • Secure the Network Telephony Infrastructure
  • Secure the Remote Access Channel

Lesson 11: Exploring Firewall Basics

  • Introduction to Firewalls
  • Firewall Architecture
  • Firewall Policies

Lesson 12: Monitoring the Security Infrastructure

  • Scan for Vulnerabilities
  • Monitor for Security Anomalies
  • Set Up a Honeypot
  • Prevent Intrusions

Lesson 13: Physical Security

  • Physical Access Control
  • Physical Access Monitoring
  • Facilities Security
  • Scan for Vulnerabilities

Lesson 14: Operations Security

  • Operations Security Control
  • Operational Threats and Violations
  • OPSEC Auditing and Monitoring

Lesson 15: Enforcing Organizational Security Policies

  • Enforce Corporate Security Policy Compliance
  • Enforce Legal Compliance
  • Enforce Physical Security Compliance
  • Ethical Codes in Information Security
  • Educate Users
  • Conduct a Security Audit
  • Create Information Security Program Evaluation Metrics
  • Assess a Perimeter Policy

Lesson 16: Business Continuity and Disaster Recovery Planning

  • Business Continuity Plan Fundamentals
  • BCP Implementation
  • Plan for Disaster Recovery

Lesson 17: Managing Security Incidents

  • Computer Crime Laws and Regulations
  • Evidence Administration
  • Respond to Security Incidents
  • Recover from a Security Incident