SlideShare a Scribd company logo
OTechs
for HiTechs
Course Duration: 20 hours
Audience: System Administrators, Security Professionals, IT Professionals,
Executive and Senior Managers, Security Practitioners.
Fees: SD 2000 / trainee
* COURSE CONTENTS:
• General Introduction to Information Security
• Information Security Governance
• Risk Management
• Access Control
• Security Architecture and Design
• Physical and Environmental Security
• Telecommunications and Network Security
• Cryptography
• Business Continuity and Disaster Recovery planning
• Legal, Regulations, Investigations and Compliance
• Software Development Security
• Security Operations

More Related Content

What's hot

Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertise
Ofer JRL Cohen
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
Doug Landoll
 

What's hot (20)

security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Online security
Online securityOnline security
Online security
 
Essential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical SecurityEssential Layers of IBM i Security: Physical Security
Essential Layers of IBM i Security: Physical Security
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Lesson 2 Cryptography tools
Lesson 2 Cryptography toolsLesson 2 Cryptography tools
Lesson 2 Cryptography tools
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Why Need Of Network Security?
Why Need Of Network Security?Why Need Of Network Security?
Why Need Of Network Security?
 
E secuity
E secuityE secuity
E secuity
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
IACP 2011
IACP 2011IACP 2011
IACP 2011
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Network security
Network securityNetwork security
Network security
 
Ofer Cohen - areas of expertise
Ofer Cohen - areas of expertiseOfer Cohen - areas of expertise
Ofer Cohen - areas of expertise
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
Access control systems
Access control systemsAccess control systems
Access control systems
 
It8073 information security syllabus
It8073  information security syllabusIt8073  information security syllabus
It8073 information security syllabus
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
IT Security Guest Lecture
IT Security Guest LectureIT Security Guest Lecture
IT Security Guest Lecture
 
ECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint PresentationECDL IT Security PowerPoint Presentation
ECDL IT Security PowerPoint Presentation
 
Tax Preparers Presentation
Tax Preparers PresentationTax Preparers Presentation
Tax Preparers Presentation
 

More from Osman Suliman

More from Osman Suliman (17)

OTechs-Hacking_and_Penetration_Testing
OTechs-Hacking_and_Penetration_TestingOTechs-Hacking_and_Penetration_Testing
OTechs-Hacking_and_Penetration_Testing
 
OTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training CourseOTechs Network Monitoring (Nagios) Training Course
OTechs Network Monitoring (Nagios) Training Course
 
OTechs IT Package Training Course
OTechs IT Package Training CourseOTechs IT Package Training Course
OTechs IT Package Training Course
 
OTechs Training List
OTechs Training ListOTechs Training List
OTechs Training List
 
OTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) PlansOTechs Virtual Private Servers (VPS) Plans
OTechs Virtual Private Servers (VPS) Plans
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
OTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing ServicesOTechs IT Out-Sourcing Services
OTechs IT Out-Sourcing Services
 
OTechs Product Catalogue
OTechs Product CatalogueOTechs Product Catalogue
OTechs Product Catalogue
 
OTechs Cloud Computing Training Course
OTechs Cloud Computing Training CourseOTechs Cloud Computing Training Course
OTechs Cloud Computing Training Course
 
OTechs Cloud computing security
OTechs Cloud computing securityOTechs Cloud computing security
OTechs Cloud computing security
 
OTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training CourseOTechs CompTIA A+ Training Course
OTechs CompTIA A+ Training Course
 
OTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training CourseOTechs Advanced WEB Security Training Course
OTechs Advanced WEB Security Training Course
 
OTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training CourseOTechs Advanced Mail Administration (POSTFIX) Training Course
OTechs Advanced Mail Administration (POSTFIX) Training Course
 
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training CourseOTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
OTechs Advanced Virtualization Administration (VMWare vcp5) Training Course
 
OTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training CourseOTechs Logging System (syslog-ng) Training Course
OTechs Logging System (syslog-ng) Training Course
 
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training CourseOTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
OTechs Hacking and Penetration Testing (BackTrack/Kali) Training Course
 
OTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training CourseOTechs Directory Sevice (OpenLDAP) Training Course
OTechs Directory Sevice (OpenLDAP) Training Course
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

OTechs Information Security Training Course

  • 1. OTechs for HiTechs Course Duration: 20 hours Audience: System Administrators, Security Professionals, IT Professionals, Executive and Senior Managers, Security Practitioners. Fees: SD 2000 / trainee * COURSE CONTENTS: • General Introduction to Information Security • Information Security Governance • Risk Management • Access Control • Security Architecture and Design • Physical and Environmental Security • Telecommunications and Network Security • Cryptography • Business Continuity and Disaster Recovery planning • Legal, Regulations, Investigations and Compliance • Software Development Security • Security Operations