STUDENT LOGIN
REDEEM VOUCHER





24/7 SUPPORT LINE from our caring & friendly experts. Just fill in the form below and get a guaranteed response in as little as 10 mins away:
*The fields marked in red are required for a successful submission.
Name*


Contact Number*


E-mail*


Comment


I.T Security Training

With organised crime now infiltrating corporate establishments the need for well grounded security professionals who have a more holistic view of the security has never been greater.

In today's Internet-dependent work environment, organisations and companies alike must connect their systems across enterprise-wide and virtual private networks. In this course, you learn how to access control systems and methodology, network and telecommunications security, security management and practices, Security and architecture models, operations security, business continuity and disaster recovery planning, law, investigation, ethics, as well as analyzing risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to network threats.

 

Aimed at security professionals who want to firmly establish themselves at the top of their market. Our I.T Security training package is aimed at anyone wanting to validate their skills as a Security professional. Open I.T’s comprehensive I.T Security package covers foundation to intermediate security concepts within the CompTIA Security+ and the CISSP will cover more advanced security Concepts as well as covering Internet security within the CIW Security.

 

CISSP - Certified Information Systems Security Professional

The CISSP® certification is a globally recognised standard of achievement that confirms an individual's knowledge in the field of information security. A CISSP certified individual is an information assurance professional who defines the architecture, design, management and/or controls that assure the security of business environments. It was the first certification in the field of information security to meet the stringent requirements of ISO/IEC Standard 17024.

 

I.T Security Training CourseJobs you will be qualified for:

 

• Security Consultant
• Security Specialist
• Information Security Architect
• Security Engineer
• Support Engineer
• Security Administrator
• Information Security Manager
• Information Security Analyst

 

CompTIA Security+

The CompTIA Security+ is an industry-recognised global certification which validates your ability and knowledge in the vast field of IT security. The vendor-neutral certification demonstrates and acknowledge your competency in these areas:

 

• Network security

 

CompTIA Security+ not only ensures that candidates will apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that security personnel are anticipating security risks and guarding against them. As the demand for IT professionals with Security and Cryptography skills grow, gaining a Security+ certification will distinguish yourself in a fast growing Security and Privacy market. Below is a short list of the range of career opportunities offered to Security+ Professionals:

 

• Security Architect
• Security Engineer
• Security Consultant/Specialist
• Information Assurance Technician
• Security Administrator
• Systems Administrator
• Network Administrator

 

CIW Security

This certification helps the student to achieve proficiency in identifying I.T security threats, developing countermeasures, and using firewall systems and attack recognition technologies. It covers the fundamental concepts and principles of network security, and it describes the most common types of attacks that can occur. It covers basic networking models, such as TCP/IP and the OSI reference model, and it explains the security vulnerabilities of protocols used at each layer in the model. It also covers the basic tools and procedures used to protect a network, including firewalls, encryption, auditing and log analysis.

 

Jobs that you will be qualified for:

 

• Network Security Consultant/Specialist
• Network Security Architect
• Network and Security Support Engineer
• Security and Network Administrator
• Information Security Manager
• Information Security Analyst

  • I.T Security Training Package
  • £999.99
  • CISSP Security Professional 2012
  •  36 Hours
  • £599.99
 

This training course is for anyone who is preparing to take the Certified Information Systems Security Professional (CISSP) exam.

 

This training course is designed to help users prepare for the Certified Information Systems Security Professional (CISSP) certification exam. The courses in this training package cover the ten CISSP common body of knowledge domains, which relate to topics such as access control, telecommunications and network security, cryptography, risk management, and business continuity, as well as many others. Each course provides information on security and technology principles crucial to the completion of the CISSP certification exam.

 

This course is set out in the following chapters:

 

  1. Access Control
  2. Chapter 1: Access Control

    • - General Concepts
    • - Authentication
    • - Principles
    • - Types and Categories
    • - Reference Monitor
    • - Techniques
    • - Models
    • - Passwords
    • - Smart Cards
    • - Biometrics
    • - Access Control Systems
    • - Administration
    • - Residuals
    • - Accountability
    • - Summary
  3. Telecommunications and Network Security
  4. Chapter 2: Telecommunications and Network Security

    • - OSI Reference Model
    • - ISO/OSI Layers and Characteristics
    • - Topologies
    • - LAN Access Methods
    • - Wireless
    • - System and Security Management
    • - Internet Protocols and Security
    • - Firewall Terms and Types
    • - Web Security
    • - Common Attacks
    • - Remote Access Security
    • - Summary
  5. Information Security Governance and Risk Management
  6. Chapter 3: Information Security Governance and Risk Management

    • - Key Concepts
    • - Definitions
    • - Key Concepts
    • - Risk Management
    • - Risk Assessment
    • - Useful Formulas
    • - 3rd Party Governance
    • - Information Classification
    • - Roles and Responsibilities
    • - Written Guidance
    • - Policies and Standards
    • - Employment Policies
    • - Employee Education Programs
    • - Change Management
    • - Summary
  7. Software Architecture and Design
  8. Chapter 4: Software Architecture and Design

    • - Problems
    • - Databases
    • - Query Language
    • - Object Oriented
    • - Applications Beyond the Database
    • - Definitions
    • - Application System Development
    • - Controls
    • - Compiled vs. Interpreted
    • - Vulnerabilities
    • - Botnets
    • - Summary
  9. Cryptography
  10. Chapter 5: Cryptography

    • - Definitions
    • - Cryptanalysis Terms
    • - Symmetric Encryption
    • - Asymmetric Encryption
    • - Hybrid Encryption
    • - Public Key Infrastructures
    • - Hash Functions
    • - Digital Signatures
    • - Protocol Based
    • - Pretty Good Privacy
    • - Cracking Techniques
    • - Summary
  11. Security Architecture and Design
  12. Chapter 6: Security Architecture and Design

    • - Abstract Levels
    • - Computer Hardware
    • - Operating Systems
    • - Processors
    • - Types of Storage
    • - Information Security Architecture
    • - Open and Closed Systems
    • - Access Controls
    • - Architectural Foundation
    • - Modes of Operation
    • - Certification and Accreditation
    • - Evaluation Criteria
    • - Security Models
    • - Summary
  13. Operations Security
  14. Chapter 7: Operations Security

    • - Threats in an Operating Environment
    • - Control Categories
    • - Accountability
    • - Trusted Recovery
    • - Management and Administrative Control
    • - Due Care and Diligence
    • - Hardware and Software Controls
    • - Email and Fax
    • - Privilege
    • - Physical Access
    • - Monitoring Techniques
    • - Problem Management
    • - Threats and Vulnerabilities
    • - Defense in Depth
    • - Summary
  15. Business Continuity and Disaster Recovery
  16. Chapter 8: Business Continuity and Disaster Recovery

    • - The Basics
    • - Reasons for BCP
    • - Key Concepts
    • - Definitions
    • - Business Continuity Life Cycle
    • - Project Initiation
    • - Business Impact Analysis
    • - Assessing Risk
    • - Recovery Strategies
    • - Off-Site Requirements
    • - Data Redundancy
    • - System Backups
    • - Plan Development
    • - Testing and Maintenance
    • - Stages in an Incident
    • - Summary
  17. Legal Requirements and Investigations
  18. Chapter 9: Legal Requirements and Investigations

    • - Ethics
    • - Code of Ethics
    • - Laws
    • - Intellectual Property
    • - Proprietary Rights
    • - Liability
    • - Computer Crime
    • - Computer Crime Laws
    • - Computer Investigation
    • - Investigation Steps
    • - Computer Forensics
    • - Evidence Admissibility
    • - Summary
  19. Physical and Environmental Security
  20. Chapter 10: Physical and Environmental Security

    • - Physical Security
    • - Crime Prevention
    • - Site Design and Configuration
    • - Boundary Protection
    • - Computing Facility Requirements
    • - Fire Prevention
    • - Fire Suppression
    • - Fire Classes
    • - Media Protection
    • - Access Controls
    • - Physical Security
    • - Summary
    • - Course Summary
  • CompTIA Security+ SY0-301
  •  31 Hours
  • £599.99
 

This training course is for anyone who is preparing for the CompTIA Security+ SY0-301 exam.

 

Securing data is vital for every organization. This certification validates the information security knowledge and skills of any IT professional. It is an international, vendor-neutral certification recognised by major hardware and software vendors, distributors and resellers. This course will prepare you to assess the security of your network and respond to security weaknesses and breaches. Practice exams are also included, which will allow you to answer questions in the same format that the test will use on exam day, and will provide in-depth instructional feedback on each question to thoroughly cover every subject you'll need to master.

 

This course is set out in the following chapters:

 

  1. Network Security
  2. Chapter 1: Network Security

    • - Network Devices
    • - Secure Network Administration
    • - Secure Network Design Elements
    • - Secure and Insucure Network Protocols
    • - Network Ports
    • - Secure Wireless
    • - Chapter Review
    • - Test Prep Questions
    • - Review Quiz
  3. Compliance and Operational Security
  4. Chapter 2: Compliance and Operational Security

    • - Risk Concepts
    • - Risk Mitigation
    • - Incident Response
    • - Security Training
    • - Business Continuity
    • - Environmental Controls
    • - Disaster Recovery
    • - Confidentiality, Integrity and Availability (CIA)
    • - Chapter Review
    • - Installing Virtual PC and Active Directory Demain Services
    • - Windows Server Backup
    • - Test Prep Questions
    • - Review Quiz
  5. Threats and Vulnerabilities
  6. Chapter 3: Threats and Vulnerabilities

    • - Malware Types
    • - Attack Types
    • - Social Engineering Attacks
    • - Wireless Attacks
    • - Application Attacks
    • - Attack Mitigation and Deterrence
    • - Attack Assessment Tools
    • - Penetration Testing vs Vulnerability Assessment
    • - Chapter Review
    • - Threats and Vulnerability Exercises
    • - Auditing
    • - Browser Security
    • - Personal Firewall
    • - Windows Software Update Services
    • - Password Crackers
    • - WinPatrol
    • - Deep Freeze
    • - Test Prep Questions
    • - Review Quiz
  7. Application, Data and Host Security
  8. Chapter 4: Application, Data and Host Security

    • - Application Security
    • - Data Security
    • - Host Security
    • - Chapter Review
    • - Vulnerabilities Exercises
    • - Anti-Malware
    • - Malicious Software Removal Tool
    • - Identifying Vulnerabilities
    • - Security Templates
    • - Test Prep Questions
    • - Review Quiz
  9. Access Control and Identity Management
  10. Chapter 5: Access Control and Identity Management

    • - Functions of Authentication Services
    • - Authentication, Authorization, and Access Control
    • - Account Management
    • - Chapter Review
    • - Access Control and Identity Management Exercises
    • - Creating a Workstation
    • - Creating an OU and Delegating Control
    • - Disabling an Account
    • - Setting Workstation Restrictions
    • - Test Prep Questions
    • - Review Quiz
  11. Cryptography
  12. Chapter 6: Cryptography

    • - Cryptography Concepts
    • - Cryptography Tools, Products, and Algorithms
    • - Public Key Infrastructure
    • - Certificate Services, Servers and Requests
    • - Use Steganography Software
    • - Chapter Review
    • - Test Prep Questions
    • - Review Quiz

Any questions? Just let us know!