Course Description
This training is designed for the manager who wants to get up to speed fast.
You will be able to put what you learn into practice the day you get back into the office. The hard working, attentive manager will acquire the essential skills required to oversee the security component of any information technology project. Students who attend mile2’s Certified Security Leadership Officer training are able to master the essential knowledge relating to current security issues, best practices, and technology.
Agenda
This training was also created for senior and advancing managers interested in quickly learning the latest in regards to information security issues and terminology. The hard working, attentive manager will acquire the essential skills required to oversee the security component of any information technology project.
Essentials topics covered in this management track include:
Network Fundamentals and Applications, Hardware Architecture, Information Assurance Foundations, Computer Security Policies, Contingency and Continuity Planning, Business Impact Analysis, Incident Handling, Architectural Approaches to Defense in Depth, Cyber Attacks, Vulnerability Assessment and Management, Security Policies, Web Security, Offensive and Defensive Information Warfare, culminating with Management Practicum
Who Should Attend:
This course is designed and taught for mid to C level managers as well as any engineers who seek to increase their knowledge in the security arena. The CSLO will give you the ability to better manage IT projects in a secure manner.
Attendees who should also attend include individuals with managerial or supervisory responsibility for information security staff. The diligent manager will learn the essential, up-to-date knowledge and skills required to supervise the security component of any information technology project.
All newly appointed information security officers Technically skilled administrators that have recently been given leadership responsibilities Seasoned managers that want to understand what your technical people are telling you Module 1 - 802.11
Module 2 - Access Control
Module 3 - Computer Forensics and Legalities
Module 4 - Cryptography Applications
Module 5 - Cryptography Algorithms and Concepts
Module 6 - Key Management
Module 7- Cryptosystems
Module 8 - Digital Acquisition
Module 9 – DNS
Module 10 - Disaster Recovery and Business Continuity Planning
Module 11 - Endpoint Security
Module 12 - Honeypots, Honeynets, Honeytokens, Tarpits, oh my
Module 13 - IP Terms and Concepts
Module 14 – Logging
Module 15 – Malicious Software
Module 16 - Managing Security Policy
Module 17 - Methods of Attack
Module 18 - Mitnick-Shimomura
Module 19 – Physical Security
Module 20 - Risk Management & Security Frameworks
Module 21 - Security and Organizational Structure
Module 22 - Security Awareness
Module 23 - Steganography
Module 24 - The Intelligent Network - Unified Threat Management (UTM)
Module 25 – Network Infrastructure
Module 26 - Vulnerability Assessment – Outside View
Module 27 - Vulnerability Management – inside view
Module 28- Vulnerability Management- User View
Module 29 - Web Communications
Module 30 - Wireless Advantages and Bluetooth