SlideShare a Scribd company logo
1 of 1
Download to read offline
OTechs
for HiTechs
Course Duration: 20 hours
Audience: System Administrators, Security Professionals, IT Professionals,
Executive and Senior Managers, Security Practitioners.
Fees: SD 2000 / trainee
* COURSE CONTENTS:
• General Introduction to Information Security
• Information Security Governance
• Risk Management
• Access Control
• Security Architecture and Design
• Physical and Environmental Security
• Telecommunications and Network Security
• Cryptography
• Business Continuity and Disaster Recovery planning
• Legal, Regulations, Investigations and Compliance
• Software Development Security
• Security Operations

More Related Content

What's hot

security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityPrecisely
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Why Need Of Network Security?
Why Need Of Network Security?Why Need Of Network Security?
Why Need Of Network Security?codeimmersive
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 
Network security
Network securityNetwork security
Network securityRaaz Karkee
 
Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer JRL Cohen
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noidaEdhole.com
 
Access control systems
Access control systemsAccess control systems
Access control systemsarnoldpeter01
 
It8073 information security syllabus
It8073  information security syllabusIt8073  information security syllabus
It8073 information security syllabusssuserb2f734
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest LectureMurthinty
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationCiaran Comerford
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers PresentationDoug Landoll
 

What's hot (20)

security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Online security
Online securityOnline security
Online security
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Why Need Of Network Security?
Why Need Of Network Security?Why Need Of Network Security?
Why Need Of Network Security?
 
E secuity
E secuityE secuity
E secuity
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
IACP 2011
IACP 2011IACP 2011
IACP 2011
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Network security
Network securityNetwork security
Network security
 
Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertise
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
Access control systems
Access control systemsAccess control systems
Access control systems
 
It8073 information security syllabus
It8073  information security syllabusIt8073  information security syllabus
It8073 information security syllabus
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest Lecture
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint Presentation
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
 

More from Osman Suliman

OTechs-Hacking_and_Penetration_Testing
OTechs-Hacking_and_Penetration_TestingOTechs-Hacking_and_Penetration_Testing
OTechs-Hacking_and_Penetration_TestingOsman Suliman
 
OTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training CourseOTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training CourseOsman Suliman
 
OTechs IT Package Training Course
OTechs IT Package Training CourseOTechs IT Package Training Course
OTechs IT Package Training CourseOsman Suliman
 
OTechs Training List
OTechs Training ListOTechs Training List
OTechs Training ListOsman Suliman
 
OTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) PlansOTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) PlansOsman Suliman
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposalOsman Suliman
 
OTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing ServicesOTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing ServicesOsman Suliman
 
OTechs Product Catalogue
OTechs Product CatalogueOTechs Product Catalogue
OTechs Product CatalogueOsman Suliman
 
OTechs Cloud Computing Training Course
OTechs Cloud Computing Training CourseOTechs Cloud Computing Training Course
OTechs Cloud Computing Training CourseOsman Suliman
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing securityOsman Suliman
 
OTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training CourseOTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training CourseOsman Suliman
 
OTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training CourseOTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training CourseOsman Suliman
 
OTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training CourseOTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training CourseOsman Suliman
 
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training CourseOTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training CourseOsman Suliman
 
OTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training CourseOTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training CourseOsman Suliman
 
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training CourseOTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training CourseOsman Suliman
 
OTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training CourseOTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training CourseOsman Suliman
 

More from Osman Suliman (17)

OTechs-Hacking_and_Penetration_Testing
OTechs-Hacking_and_Penetration_TestingOTechs-Hacking_and_Penetration_Testing
OTechs-Hacking_and_Penetration_Testing
 
OTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training CourseOTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training Course
 
OTechs IT Package Training Course
OTechs IT Package Training CourseOTechs IT Package Training Course
OTechs IT Package Training Course
 
OTechs Training List
OTechs Training ListOTechs Training List
OTechs Training List
 
OTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) PlansOTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) Plans
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
OTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing ServicesOTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing Services
 
OTechs Product Catalogue
OTechs Product CatalogueOTechs Product Catalogue
OTechs Product Catalogue
 
OTechs Cloud Computing Training Course
OTechs Cloud Computing Training CourseOTechs Cloud Computing Training Course
OTechs Cloud Computing Training Course
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing security
 
OTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training CourseOTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training Course
 
OTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training CourseOTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training Course
 
OTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training CourseOTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training Course
 
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training CourseOTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
 
OTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training CourseOTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training Course
 
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training CourseOTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
 
OTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training CourseOTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training Course
 

Recently uploaded

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

OTechs Information Security Training Course

  • 1. OTechs for HiTechs Course Duration: 20 hours Audience: System Administrators, Security Professionals, IT Professionals, Executive and Senior Managers, Security Practitioners. Fees: SD 2000 / trainee * COURSE CONTENTS: • General Introduction to Information Security • Information Security Governance • Risk Management • Access Control • Security Architecture and Design • Physical and Environmental Security • Telecommunications and Network Security • Cryptography • Business Continuity and Disaster Recovery planning • Legal, Regulations, Investigations and Compliance • Software Development Security • Security Operations