返學(xué)費(fèi)網(wǎng) > 培訓(xùn)機(jī)構(gòu) > 高士達(dá)技術(shù)教育中心
授課機(jī)構(gòu):高士達(dá)技術(shù)教育中心
地址:廈門市廈禾路南洋大廈2樓(金榜公園站)
網(wǎng)報(bào)價(jià)格:¥電詢
課程原價(jià):¥電詢
咨詢熱線:400-850-8622
課程詳情 在線報(bào)名
垃圾郵件,黑客、病毒入侵,耗損企業(yè)生產(chǎn)力,面對(duì)層出不窮的網(wǎng)絡(luò)攻擊事件,你的網(wǎng)絡(luò)夠安全嗎?當(dāng)你部署防火墻、入侵檢測(cè)與防毒軟件之后,你知道還有哪些技術(shù)可以協(xié)助你部署更安全無憂的IT環(huán)境?
我們特別邀請(qǐng)安全專家為你規(guī)劃如下安全培訓(xùn)課程,帶你深入探討防御企業(yè)網(wǎng)絡(luò)的新思維,協(xié)助你有效防堵惡意入侵,真正為企業(yè)建立無“黑”的IT安全環(huán)境。
培訓(xùn)對(duì)象:
企業(yè)信息安全主管、信息安全業(yè)內(nèi)人士、網(wǎng)絡(luò)安全技術(shù)人員、IT或安全管理人員等
通過本課程你可以學(xué)習(xí)到:
解釋共同的攻擊反對(duì)網(wǎng)絡(luò)財(cái)產(chǎn)、伴生的威脅和弱點(diǎn),并且什么網(wǎng)絡(luò)安全人員做鞏固財(cái)產(chǎn)。
解釋如何使用密碼學(xué)幫助保護(hù)信息和如何選擇組織的適當(dāng)?shù)募用芊椒ā?/p>
實(shí)施在組織的安全改進(jìn)的計(jì)算的基礎(chǔ)線。
通過使用認(rèn)證和存取控制,幫助保護(hù)在組織的信息。
部署并且處理證明。
幫助通過辨認(rèn)對(duì)網(wǎng)絡(luò)設(shè)備的威脅和實(shí)施共同的數(shù)據(jù)傳輸、遠(yuǎn)程存取和無線網(wǎng)絡(luò)交通的安全保護(hù)數(shù)據(jù)傳輸。
幫助保護(hù)網(wǎng)絡(luò)服務(wù)器以防止共同的攻擊和配置網(wǎng)瀏覽器的安全
幫助保護(hù)電子郵件和立即傳訊免受普通安全威脅。
辨認(rèn)對(duì)名址服務(wù)和域名服務(wù)器的普通安全威脅和弱點(diǎn),然后運(yùn)用安全方法幫助保護(hù)他們。
辨認(rèn)網(wǎng)絡(luò)周長威脅和顯示器網(wǎng)絡(luò)的周長安全。
辨認(rèn)安全策略的類型處理操作的安全,然后使用這些政策由組織的用戶保證服從。
通過實(shí)施一個(gè)安全改進(jìn)的災(zāi)害恢復(fù)戰(zhàn)略,傳達(dá)風(fēng)險(xiǎn)對(duì)其他和執(zhí)行安全備份與補(bǔ)救保存企業(yè)連續(xù)性。
辨認(rèn),反應(yīng)對(duì),并且協(xié)助安全事件的正式調(diào)查。
課程時(shí)間:共6次課,3小時(shí)/次 60%理論學(xué)習(xí),40%動(dòng)手實(shí)驗(yàn)
主辦單位:微軟(*)有限公司 教育培訓(xùn)與認(rèn)證事業(yè)部 廈門高士達(dá)微軟高級(jí)技術(shù)教育中心
課程大綱:
課程模塊 |
課程內(nèi)容 |
實(shí)驗(yàn)內(nèi)容 |
Module1: Preparing to Secure Information |
Explaining How Assets Are Attacked Explaining How Assets Are Secured |
Preparing to Secure Information |
Module2: Implementing Security-Enhanced Computing Baselines |
Introduction to Trusted Computing Bases Establishing a Security Baseline Monitoring a Security Baseline Helping to Secure Computers Physically Maintaining a Security Baseline |
Maintaining Baseline Security |
Module3: Helping to Protect Information Using Authentication and Access Control |
Introduction to Access Control Implementing an Authentication Strategy Implementing an Access Control Strategy |
Securing Accounts (MBSA) |
Module4: Using Cryptography to Help Protect Information |
Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption |
Using Cryptography to Help Protect Information |
Module5: Using a PKI to Help Protect Information |
Introduction to Certificates Introduction to Public Key Infrastructure Deploying and Managing Certificates |
Using Certificates |
Module6: Securing Internet Applications and Components |
Helping to Protect Web Server Configuring Security for Common Internet Protocols Configuring Security for Web Browsers Configuring Security for Databases |
Securing Web Servers Protecting Clients from Active Content |
Module7: Implementing Security for E-Mail and Instant Messaging |
Securing E-Mail Servers Securing E-Mail Clients Securing Instant Messaging |
Securing Mail Servers |
Module8: Managing Security for Directory Services and DNS |
Helping protect Directory Services Against Common Threats Helping Protect DNS Against Common Threats |
Managing Security for Directory Services and DNS |
Module9: Securing Data Transmission |
Identifying Threats to Network Devices Implementing Security for Common Data Transmission Implementing Security for Remote Access Implementing Security for Wireless Network Traffic |
Securing Data Transmission Using IPSec to Secure Data Transmission |
Module10: Implementing and Monitoring Security for Network Perimeters |
Introduction to Network Perimeters Implementing Security on Inbound and Outbound Network Traffic Monitoring Network Traffic |
Implementing and Monitoring Security for Network Perimeters |
Module11: Managing Operational Security |
Establishing Security Policies and Procedures Educating Users about Security Policies Applying Security Policies to Operational Management Resolving Ethical Dilemmas When Helping to Protect Assets |
Managing Operational Security |
Module12: Preserving Business Continuity |
Preparing to Recover from Disasters Communicating the Impact of Risks Performing a Security-Enhanced Backup and Recovery |
Preserving Business Continuity |
Module13: Responding to Security Incidents |
Identifying Security Incidents Responding to Security Incidents Investigating Security Incidents |
Responding to Security Incidents |
只要一個(gè)電話
我們免費(fèi)為您回電