IT Security & Forensic Basic
Service Times: 9am and 10:30am
6399 North Wells Road, Bigtownville, CO 32748
Latest
  • Loading
f

IT Security & Forensic Basic

Email Print Export to ical format

Venue:

Academy of Management & Science (AMS)
House # 89/E, Road # 13/C, Block # E, Banani, Dhaka 1213, Bangladesh
Telephone: +880 (2) 9891190, +880 (2) 8836875, Cell No: (88) 01680878839, (88) 01193070284

Resource Person

Motashim Al Razi completed his graduation in Computer Science at Bangalore University, India and completed his MS in Information Security and Computer Forensics from University of East London, UK. He worked as a Digital Forensics analyst at IBM, UK for several years. Prior to joining IBM he worked as a system administrator in The Central College of London and Titan telecom, UK. He also attended magistrate court for IPR case proceedings. He is a Certified Ethical Hacker from EC-council and Cisco Certified Network Associate. During his working tenure with IBM he served as an IT security auditor in NHS (National Health Service), UK.

Currently he is involved in creating National Information Security policy for Bangladesh. He is an enlisted security auditor of Controller of Certifying Authority (CCA) of Bangladesh.  He is a IT security trainer at Academy of Management and Science (AMS).

Workshop Details

Venue:Academy of Management & Science (AMS)
House # 89/E, Road # 13/C, Block # E, Banani, Dhaka-1213, Bangladesh
Telephone:
+880-2-9891190
+880 (2) 8836875
Cell No:
(88) 01680878839
(88) 01193070284
Duration:
5 Days(Full Day) / 40 Hours
Certification:
Course Participation Certificate will be awarded

Who Can Attend

Minimum Graduating Students, IT & Non IT Professionals

Methodology

PowerPoint Presentation, Interactive Lecture, Case Study, Classroom exercise, Question and Answer session.

Download

IT Security & Forensic Basic

Course Code:

01-ITS-ISB-0001

Overview:

To ensure IT security in any system or any application is one of the most challenging task nowadays. As day progress new threats have identified. As Bangladesh has just entered into the digitization process and still system automation is just going on, it needs a number of efficient & technologically sound people to maintain those systems both in Government sector & private sector. There are a number globally renowned IT security certification courses for different level of users & professionals.

Prerequisite:

Minimum Graduating Students of any subject

Duration:

26 Hours

Course Objectives:

The trainee will be able to:

  • Understand basic concepts of IT security & threats
  • Will be able to identify the threats area & security policy implementation domains
  • Will be able to prepare for advance level IT courses including some certification course like CEH, CHFI etc

Course Details:

Information Security and Risk Management
• Security management responsibilities
• Difference between administrative, technical, and physical controls
• Three main security principles
• Risk management and risk analysis
• Security policies
• Information classification
Security Management
Security management includes risk management, information security policies, procedures, standards, guidelines, baselines, information classification, security organization, and security education.
Access Control
• Identification methods and technologies
• Authentication methods, models, and technologies
• Discretionary, mandatory, and nondiscretionary models
• Accountability, monitoring, and auditing practices
• Emanation security and technologies
• Intrusion detection systems
• Possible threats to access control practices and technologies
Access Controls Overview
Access controls are security features that control how users and systems communicate and interact with other systems and resources. They protect the systems and resources from unauthorized access and can be components that participate in determining the level of authorization after an authentication procedure has successfully completed.
Physical and Environmental Security
• Administrative, technical, and physical controls
• Facility location, construction, and management
• Physical security risks, threats, and countermeasures
• Electric power issues and countermeasures
• Fire prevention, detection, and suppression
• Intrusion detection systems
Physical security overview
Security is very important to organizations and their infrastructures, and physical security is no exception. Hacking is not the only way information and their related systems can be compromised. Physical security encompasses a different set of threats, vulnerabilities, and risks than the other types of security we’ve addressed so far. Physical security mechanisms include site design and layout, environmental components, emergency response readiness, training, access control, intrusion detection, and power and fire protection. Physical security mechanisms protect people, data, equipment, systems, facilities, and a long list of company assets.
Cryptography
• History of cryptography
• Cryptography components and their relationships
• Government involvement in cryptography
• Symmetric and asymmetric key algorithms
• Public key infrastructure (PKI) concepts and mechanisms
• Hashing algorithms and uses
• Types of attacks on cryptosystems
Cryptography overview
Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is considered a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through untrusted network communication paths.
Legal, Regulations, Compliance, and Investigations
• Computer crimes and computer laws
• Motives and profiles of attackers
• Various types of evidence
• Laws and acts put into effect to fight computer crime
• Computer crime investigation overview
• Incident-handling procedures
• Ethics pertaining to information security professionals and best practices
Operations Security
• Administrative management responsibilities
• Operations department responsibilities
• Configuration management
• Trusted recovery states
• Redundancy and fault-tolerant systems
• E-mail security
• Threats to operations security
Operation Security overview
Operations security pertains to everything that takes place to keep networks, computer systems, applications, and environments up and running in a secure and protected manner. It consists of ensuring that people, applications, and servers have the proper access privileges to only the resources they are entitled to and that oversight is implemented via monitoring, auditing, and reporting controls. Operations take place after the network is developed and implemented. This includes the continual maintenance of an environment and the activities that should take place on a day-to-day or week-to-week basis. These activities are routine in nature and enable the network and individual computer systems to continue running correctly and securely.
Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is considered a science of protecting information by encoding it into an unreadable format. Cryptography is an effective way of protecting sensitive information as it is stored on media or transmitted through untrusted network communication paths.

Certification
Course completion certification will be provided from AMS

Training Calendar

<<  February  2018  >>
 S  M  T  W  T  F  S 
      1  2  3
  4  5  6  7  8  910
11121314151617
18192021222324
25262728   

Newsletter

AMS Campus Facilities

  • Two Air conditioned seminar halls with projector & audio system [Maximum Capacity up to 50 persons] including video recording capacity.
  • Two different PC Labs (Air conditioned)
  • Centralized server
  • Internet / WIFI facilities
  • Practice facilities in LABS
  • Online Exam Centre
  • Cafeteria & Own cook facility
  • Large lobby with natural surroundings
  • Huge Parking Space
  • Waiting Lounge
  • Distance education facilities
  • Printer, Scanner etc logistics facilities
  • Special Guest Room
  • Registration Booth Arrangement Space
  • 3 Star Accommodation arrangements for foreign guests on demand in walking distance from the center.
    ………and many more

Contact AMS

Academy of Management & Science (AMS)
House #450, Road # 31, New DOHS,Mohakhali, Dhaka-1206, Bangladesh
Cell No: (88) 01616004108
Email: This email address is being protected from spambots. You need JavaScript enabled to view it.

Academy Location

Testimonials

Show