_


Course Introduction

In today’s world, Information Technology is playing a pivotal role in business, most of the organizations and enterprises depend on different kinds of Information Technology solutions, say e-commerce, e-governance, e-learning, e-banking etc.. Battles between corporations, governments, and countries are no longer fought using physical force. Cyber war has begun and the consequences can be seen in everyday life. With the onset of sophisticated cyber-attacks, the need for advanced cyber security and Security Audit  training became mandatory in the present day.

An information security policy (ISP) is a set of rules that guide individuals who work with IT assets. Your company can create an information security policy to ensure your employees and other users follow security protocols and procedures. ISPs should address all data, programs, systems, facilities, infrastructure, users, third-parties and fourth-parties of an organization.

A cyber security audit focuses on cyber security standards, guidelines and procedures, as well as the implementation of these controls. The cyber security audit relies on other operational audits as well

Industrial Training Objectives

  • To  will provide knowledge in Information Security to product your IT Infrastructure.   
  • This Course provides in-depth knowledge in Information Security Polices & Security Audit

Course Outcomes

  • Information  Security Overview
  • Types of Attacks
  • Goals for Security and its properties
  • Security Threats and Vulnerabilities
  • System & Internet Security
  • Web Application Security
  • Network & Mail Attacks
  • Wireless Security
  • About Computer Forensics
  • About Information Security Policy
  • Importance of  information security policy 
  • Key elements of an information security policy
  • Best Practices for Information Security Management
  • IT ACT/ ITAA 2008 INDIAN PENAL CODE

About Security Audit

  • Data security policies relating to the network, database and applications in place
  • Data loss prevention measures deployed
  • Effective network access controls implemented
  • Detection/prevention systems deployed
  • Security controls established (Physical and Logical)
  • Incident Response Program Implemented
  • National Institute Of Standards And Technology (Nist) Guidelines
  • Key Elements Of Cyber Security Auditing: Controls And Threats

 

Course Schedule

Dates: 22 – 26 Nov 2021 ( 3 Hours per day )

Timings: After Resistration Participant can access ESCI LMS platform for digital Learning

Online Session timings will be from 13:30 – 16:30 hrs with 10 Minutes breaks.

Course Content