Information
Security Fundamentals
What is it?
How Much Does it Cost?
When is the Class?
Who Should Attend?
What Will You Learn?
Frequently Asked Questions
About the Instructor
What
is it?
"Information
Security Fundamentals" is a complete 10-hour course
that teaches security end-to-end. The training course is
based on the book, The Secured Enterprise: Protecting Your
Information Assets. The course includes interactive, instructor-led
online training and a package containing 10 one-hour audio
CD’s, one presentation CD, and the book.
With
our unique "learn while you drive" approach to
security, the audio CD’s can be used to enforce what
you learn during the weekly class.
Presented
by Paul E. Proctor, Module 1, the first hour, is also available
as a self-paced tutorial and includes an audio CD.
Order
the first module now for $24.95
Sign up now for the
10 hour course
How
Much Does it Cost?
The
complete, ten-hour course is $695.00. Register by December
15, 2002 for only $595.00. If you have more than five people
attending, contact us for information on a corporate discount.
When
is the Class?
Starting
January 28, 2003, a one-hour class will be held each Tuesday
at 3:00 pm (Eastern Time) for ten weeks. Each class includes
a live Webcast, so your instructor can answer your questions
immediately.
Who
Should Attend?
-
Security Professionals
Learn about the tie between security and business, and how
to talk to your managers about security. Also prepare for
the CISSP examination.
- Network
and System Administrators
Expand your security knowledge to become more effective.
-
Business Line Managers
Learn about security in your business, and learn how important
your role is for effective information security.
What
Will You Learn?
Securing
enterprise data, applications, and intellectual property
has become the critical issue for business decision makers
in the era of hackers and potential cyberterrorism. Like
attending a two-day seminar on security, this 10-hour class
provides non-technical, business-oriented information on
every key aspect of security.
You’ll
learn about the types of threats against information security,
how to define security requirements for your organization,
and how to select the appropriate solutions to protect against
threats. You’ll learn about the attack timeline and
how to close the window of exposure. You’ll learn
about the different security technologies, and the advantages
and disadvantages of each.
You’ll
also learn how to analyze risks, how to justify security,
and how to establish a security program within your organization.
You’ll learn about security policies, policy management,
and how to ensure your business continues to operate in
case of disaster.
Whether you are the person in charge of security, or the
network administrator, or the business manager who needs
security, each of you has an important role. This course
is designed to assist you with your information security
needs. At the end of the course, you will understand your
responsibility in security. And if you are a security professional,
this course can be used to help prepare or review for the
CISSP.
Frequently
Asked Questions
Will
this course provide me with the information I need to convince
management of the need for a security program?
Yes.
This course provides basic information on justifying security,
recognizing threats, and techniques for securing your enterprise.
Should
other people in my organization take this course?
Definitely.
This course is designed for business managers, security
and network administrators, and even the CIO of your organization.
How
can I find out what topics will be covered in this course?
Download
the Class Schedule to see what topics are covered each week.
My
company is located in Europe. Is this course still applicable
to someone who works outside of the USA?
Yes.
The information you will learn can be applied to any company,
anywhere.
Will
I be able to contact the instructor if I have questions or
need additional information?
Yes.
Your instructor will be available online during the weekly
class.
Are
there any specific hardware or software requirements that
must be met before I take this course?
No.
This course is provided as a Webcast, and includes a separate
CD that contains the presentation material discussed during
the classes. Also included are audio CDs, so you can listen
to the course while you commute to/from the office.
About
the Instructor
Founder
and chief technology officer of Practical Security, Inc.,
Paul E. Proctor, has over 15 years experience in computer
security. Previously, Paul was founder and CTO at Centrax
Corporation and senior vice president of NFR Security. He
developed the Computer Misuse Detection System (CMDS), one
of the first commercially available host-based intrusion
detection systems while at SAIC, and was director of technology
at CyberSafe Corporation before joining NFR Security.
Paul
E. Proctor is the inventor of patented intrusion detection
technology and the author of two recent books, The Practical
Intrusion Detection Handbook, and The Secured Enterprise:
Protecting Your Information Assets (co-authored with F.
Christian Byrnes). Paul holds a Bachelor of Science degree
in mathematics and computer science from the University
of Illinois.
Order the first module now for $24.95
Sign up now for the
10 hour course
|