Skip to main Content

IT-Security Foundation

  • Code training S-ITSF
  • Duur 2 dagen

Klassikale training Prijs

eur1.395,00

(excl. BTW)

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Class Connect

    Verbind naar een klas in HD

  • Klassikale training

    Klassikaal leren

  • Op locatie klant

    Op locatie klant

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven
Information security rests on three pillars: people, processes and technology. The IT-Security world uses its own specific tools and jargon. This technical jargon may be quite difficult for people with a non-technical background. The S-ITSF course introduces you to the main technical tools and the related vocabulary in an accessible way.

Doelgroep

Naar boven

The IT-Security Foundation certifcation (S-ITSF) is suitable for those who need to demonstrate basic technical knowledge and familiarity with IT security concepts, such as NAT, DPI or VPN. For instance: 

  • Upcoming information security professionals
  • IT-Auditors
  • Service Management staff
  • Helpdesk staff

This certification is an ideal start for new IT-security professionals. Should you want to specialize further, you can attain the next levels of certification:

  • S-ITSP IT-Security Practitioner
  • S-ITSE IT-Security Expert

Training and certification for each of these certifications is available through Global Knowledge

Trainingsdoelstellingen

Naar boven

With this course you will be introduced in two days in an accessible way to the most important technical tools that the information security officer has at his disposal. It tells what is in the toolbox and what each tool does (the concepts are explained), without being bombarded with all kinds of details about the exact technical operation. 

Inhoud training

Naar boven
Systems
  • Hardware
  • Operating Systems
  • Modes of cooperation

 

Software
  • Types or software
  • Common causes of vulnerabilities
  • Mitigations for common vulnerabilities
  • Databases

 

Networking
  • Networking devices
  • Network connections
  • Network models
  • Network architecture
  • Network addressing

 

Cryptography
  • Types of cryptography
  • Public Key Infrastructure
  • Major cryptographic network protocols
  • Major cryptographic applications

 

IT security administration
  • Know your enemy: Hacking as a process, Tool of their trade
  • Know yourself: IT security administration as a process, Tool of our trade

Voorkennis

Naar boven
During the IT Security Foundation course the basics of IT security are discussed. It is recommended that you are broadly familiar with a number of basic IT concepts, such as IP address or network. Furthermore, no prior knowledge is required to participate in this course at foundation level. The level of this course is MBO +.
Cookie Control toggle icon