Is This for You?

This course is designed as an introductory-level information security course for anyone looking to develop an understanding of essential information security concepts.

Award and Associated Qualifications

cpd

Awarded 20 CPD points upon successful completion

About This Course

In this course, you will learn the key concepts of different security topologies and the key role they play in network security. You will explore DevOps practices, such as continuous security and security monitoring, the benefits of using DevOps, and best practices of DevOps security. You will discover the importance of implementing security governance in an organisation.

You will examine the strengths and weaknesses of a honeypot and how it is placed in networks. (A honeypot system is configured to detect, deflect, or counteract any unauthorised attempt to gain access to information.) You will explore why pen testing is needed to ensure secure environments and investigate tools used for pen testing. And you will learn about key Advanced Persistent Threat (APT) concepts, such as defense and best practices.

You will also examine key features of network access control (NAC), the importance of NAC in a network, various NAC elements, authentication, and its implementation. You will explore key concepts related to subnetting, virtual machines (VMs), containers, and DNS security. And you will explore the common protocols in use and discover the security issues of the transmission control protocol / Internet protocol (TCP/IP) model and security protocols.

COURSE CONTENT

Module 1 – Hardened Security Topologies

Module 2 – Continual Infrastructure Testing

Module 3 – Security Governance

Module 4 – Honeypots

Module 5 – Pen Testing

Module 6 – APT Defenses

Module 7 – NACs & Gateways

Module 8 – Subnetting & DNS for Security Architects

Module 9 – Securing Networking Protocols

Download Course Packet

"*" indicates required fields

Accept*
Hidden
Hidden
Hidden

Download Course Packet

"*" indicates required fields

Accept*
Hidden
Hidden
Hidden

Download Course Packet

"*" indicates required fields

Accept*
Hidden
Hidden
Hidden

Aims and Objectives

This course is designed to further your introduction to core information security concepts.

Pre-Requisites

There are no pre-requisites for this course.

Finance Options

Wherever possible our training is tailored to your needs. The cost of our training programmes depend on the course(s) you choose and varies according to duration and breadth. Rest assured we have a number of payment options available to ensure the cost of training is affordable and can be worked alongside your other financial commitments. Common ways people fund their training include: –

Self-Funded:

  • Flexible payment plans to help you spread the cost* available at many of our centres;
  • You could opt to pay upfront.

Company Funded:

Requesting funding from your employers needn’t be a daunting task. Many employers support and encourage their employees with their professional development and consider it a worthwhile investment to fund any training required.

What we can help with:

  • Providing a comprehensive training programme outlining learning outcomes
  • Tailored personnel letters
  • Communication with finance departments to arrange payment options (upfront or payment plan*).

Funding & Grants:

There may be the opportunity to apply for funded grants that can help towards the cost of training. These include the Skills Development Scotland ITAs and the ReAct programme in Wales. All schemes will have different terms and conditions that will need to be met in order to qualify for a grant and these are managed by each individual centre.

We’d recommend you speak to a Course Advisor in your local centre to find out whether they are registered to offer any such schemes and discuss your requirements further.

* Terms and Conditions apply. Speak to a Course Advisor for full information on the options available to you.

Career Path

This course will be helpful to anyone looking to develop a foundational understanding of key information security concepts.