日本亚洲欧美日韩中文字幕_精品欧美一区二区三区久久久_久久av高潮av无码av_成在人线av无码免费_亚洲中文字幕无码久久精品1

返學(xué)費(fèi)網(wǎng) > 培訓(xùn)機(jī)構(gòu) > 高士達(dá)技術(shù)教育中心

400-850-8622

全國統(tǒng)一學(xué)習(xí)專線 8:30-21:00

高士達(dá)【課程】信息安全攻防戰(zhàn)略

授課機(jī)構(gòu):高士達(dá)技術(shù)教育中心

地址:廈門市廈禾路南洋大廈2樓(金榜公園站)

網(wǎng)報(bào)價(jià)格:¥電詢

課程原價(jià):¥電詢

咨詢熱線:400-850-8622

課程詳情 在線報(bào)名

 垃圾郵件,黑客、病毒入侵,耗損企業(yè)生產(chǎn)力,面對(duì)層出不窮的網(wǎng)絡(luò)攻擊事件,你的網(wǎng)絡(luò)夠安全嗎?當(dāng)你部署防火墻、入侵檢測(cè)與防毒軟件之后,你知道還有哪些技術(shù)可以協(xié)助你部署更安全無憂的IT環(huán)境? 

我們特別邀請(qǐng)安全專家為你規(guī)劃如下安全培訓(xùn)課程,帶你深入探討防御企業(yè)網(wǎng)絡(luò)的新思維,協(xié)助你有效防堵惡意入侵,真正為企業(yè)建立無“黑”的IT安全環(huán)境。 

培訓(xùn)對(duì)象:

企業(yè)信息安全主管、信息安全業(yè)內(nèi)人士、網(wǎng)絡(luò)安全技術(shù)人員、IT或安全管理人員等

通過本課程你可以學(xué)習(xí)到:

解釋共同的攻擊反對(duì)網(wǎng)絡(luò)財(cái)產(chǎn)、伴生的威脅和弱點(diǎn),并且什么網(wǎng)絡(luò)安全人員做鞏固財(cái)產(chǎn)。

 解釋如何使用密碼學(xué)幫助保護(hù)信息和如何選擇組織的適當(dāng)?shù)募用芊椒ā?/p>

實(shí)施在組織的安全改進(jìn)的計(jì)算的基礎(chǔ)線。

通過使用認(rèn)證和存取控制,幫助保護(hù)在組織的信息。

 部署并且處理證明。

幫助通過辨認(rèn)對(duì)網(wǎng)絡(luò)設(shè)備的威脅和實(shí)施共同的數(shù)據(jù)傳輸、遠(yuǎn)程存取和無線網(wǎng)絡(luò)交通的安全保護(hù)數(shù)據(jù)傳輸。

幫助保護(hù)網(wǎng)絡(luò)服務(wù)器以防止共同的攻擊和配置網(wǎng)瀏覽器的安全

幫助保護(hù)電子郵件和立即傳訊免受普通安全威脅。

辨認(rèn)對(duì)名址服務(wù)和域名服務(wù)器的普通安全威脅和弱點(diǎn),然后運(yùn)用安全方法幫助保護(hù)他們。

辨認(rèn)網(wǎng)絡(luò)周長威脅和顯示器網(wǎng)絡(luò)的周長安全。

辨認(rèn)安全策略的類型處理操作的安全,然后使用這些政策由組織的用戶保證服從。

通過實(shí)施一個(gè)安全改進(jìn)的災(zāi)害恢復(fù)戰(zhàn)略,傳達(dá)風(fēng)險(xiǎn)對(duì)其他和執(zhí)行安全備份與補(bǔ)救保存企業(yè)連續(xù)性。

辨認(rèn),反應(yīng)對(duì),并且協(xié)助安全事件的正式調(diào)查。

 

課程時(shí)間:共6次課,3小時(shí)/次   60%理論學(xué)習(xí),40%動(dòng)手實(shí)驗(yàn) 

主辦單位:微軟(*)有限公司 教育培訓(xùn)與認(rèn)證事業(yè)部   廈門高士達(dá)微軟高級(jí)技術(shù)教育中心

課程大綱:

課程模塊

課程內(nèi)容

實(shí)驗(yàn)內(nèi)容

Module1:

Preparing to Secure Information

Explaining How Assets Are Attacked

Explaining How Assets Are Secured

  Preparing to Secure Information

Module2:

Implementing Security-Enhanced Computing Baselines

Introduction to Trusted Computing Bases

  Establishing a Security Baseline

  Monitoring a Security Baseline

  Helping to Secure Computers Physically

  Maintaining a Security Baseline

  Maintaining Baseline Security

Module3:

Helping to Protect Information Using Authentication and Access Control

  Introduction to Access Control

  Implementing an Authentication Strategy

  Implementing an Access Control Strategy

  Securing Accounts (MBSA)

Module4:

Using Cryptography to Help Protect Information

  Introduction to Cryptography

  Using Symmetric Encryption

  Using Hash Functions

  Using Public Key Encryption

  Using Cryptography to Help Protect Information

Module5:

Using a PKI to Help Protect Information

  Introduction to Certificates

  Introduction to Public Key Infrastructure

  Deploying and Managing Certificates

  Using Certificates

Module6:

Securing Internet Applications and Components

  Helping to Protect Web Server

  Configuring Security for Common Internet Protocols

  Configuring Security for Web Browsers

  Configuring Security for Databases

  Securing Web Servers

  Protecting Clients from Active Content

Module7:

Implementing Security for E-Mail and Instant Messaging

  Securing E-Mail Servers

  Securing E-Mail Clients

  Securing Instant Messaging

  Securing Mail Servers

Module8:

Managing Security for Directory Services and DNS

  Helping protect Directory Services Against Common Threats

  Helping Protect DNS Against Common Threats

  Managing Security for Directory Services and DNS

Module9:

Securing Data Transmission

  Identifying Threats to Network Devices

  Implementing Security for Common Data Transmission

  Implementing Security for Remote Access

  Implementing Security for Wireless Network Traffic

  Securing Data Transmission

  Using IPSec to Secure Data Transmission

Module10:

Implementing and Monitoring Security for Network Perimeters

  Introduction to Network Perimeters

  Implementing Security on Inbound and Outbound Network Traffic

  Monitoring Network Traffic

  Implementing and Monitoring Security for Network Perimeters

Module11:

Managing Operational Security

  Establishing Security Policies and Procedures

  Educating Users about Security Policies

  Applying Security Policies to Operational Management

  Resolving Ethical Dilemmas When Helping to Protect Assets

  Managing Operational Security

Module12:

Preserving Business Continuity

  Preparing to Recover from Disasters

  Communicating the Impact of Risks

  Performing a Security-Enhanced Backup and Recovery

  Preserving Business Continuity

Module13:

Responding to Security Incidents

  Identifying Security Incidents

  Responding to Security Incidents

  Investigating Security Incidents

  Responding to Security Incidents

  • 報(bào)名課程:
  • 性別:
  • 姓名:
  • 手機(jī)號(hào)碼:
  • 其它說明:
姓名不能為空
手機(jī)號(hào)格式錯(cuò)誤