We are using cookies to give you the best experience on our site. Cookies are files stored in your browser and are used by most websites to help personalise your web experience.
By continuing to use our website without changing the settings, you are agreeing to our use of cookies.
SZT IM

Információbiztonsági auditor

Category:
Difficulty level: Intermediate
Exam code
A tanfolyamhoz nem kapcsolódik közvetlenül vizsga.
Net price/person:
299.000 HUF
Duration
4 Day
Offline
application
Certification route
Description

With our four days, instructor lead training, students receive the necessary knowledge in order to be able to implement and manage an IT information protection system and be capable to further develop their own company’s security level. Our trainers give hands-on instructions and practices regarding the importance of cooperation of organizational units and the improvement possibilities of communication. It is really important for the Security Auditor to be aware of the current technology trends, available solutions and their potential risks, that’s why we also focus on the planning and implementation viewpoint of these topics. During the course, our students will get in touch with encryption, several protection methods, including both Internet and intrusion prevention, the aspects of backup/restore, redundancy and also burglary protection.

Aim

The goal of this course is to prepare and further train IT security personnel in order to be able to properly deal with today’s most recent trends and technologies.

Recommended for

This course is recommended for IT Security personnel, who develops, implements or works with IT Information Protection systems.

Prerequisites

Participating students should have basic knowledge of IT networking and security. It is also an advantage to have management and quality management experiences. Basic read of English language is recommended.

Syllabus

General aspects of Information Protection

  • Overview, basic concepts
  • Vulnerability forms and protection possibilities
  • Virus and spyware management
  • Protection of Internet applications and browsers
  • Overview of social engineering
  • General security directives (privileges, risks, documentation)


Components of Information Protection technologies

  • Encryption and authentication
  • Protection possibilities of electronic mails
  • User and Role based security
  • Authentication and Authorization
  • Network security
  • Intrusion Detection Systems (IDS)
  • Internet Security
  • Ensuring Business Continuity (backup and redundancy)


Information Security – General concepts

  • General protection
  • Defining the value of information and the necessity of its protection
  • Defining the reliability of information, categorizing to levels


Threats and risks

  • Defining threats and risks
  • IT Risk Management basics

IT Security processes

  • Modelling and identifying IT Security processes
  • Identifying critical processes

IT Security standards, comparison and their basics

  • ISO 9001, ISO/IEC 27001, COBIT, ITIL, ISO 20000 standards and recommendations
  • Integrating possibilities of ERP and IT Security systems


IT Security organizational design

  • Creating and managing security policies

Operation of Information Security systems

  • Physical protection measures
  • Technical and organizational measures

Compliance

  • Laws
  • Internal rules
  • Identifying requirements

Overview of audit processes

  • Examination of compliance
  • Audit methodologies (COBIT, ISO)
  • Closure of audits, documentation and evaluation
  • Determination of post-audit tasks