What is it?
How Much Does it Cost?
When is the Class?
Who Should Purchase This Class?
What Will You Learn?
Frequently Asked Questions
About the Instructor
Security Fundamentals" is a complete 10-hour course
that teaches security end-to-end. The training course is
based on the book, The Secured Enterprise: Protecting Your
Information Assets. The course includes a package containing
10 one-hour audio CDs, one presentation CD, and the book.
Order now and receive a free CD case!
our unique "learn while you drive" approach
to security, the audio CDs can be used to enforce what
by Paul E. Proctor, Module 1, the first hour, is also available
as a self-paced tutorial and includes an audio CD.
the first module now for $24.95
10 hour course
Much Does it Cost?
complete, ten-hour course is $395.00. Call us for volume
is the Class?
you are interested in attending an online, instructor-led
class, please contact
Should Purchase This Class?
Learn about the tie between security and business, and how
to talk to your managers about security. Also prepare for
the CISSP examination.
and System Administrators
Expand your security knowledge to become more effective.
Business Line Managers
Learn about security in your business, and learn how important
your role is for effective information security.
Learn how to secure individually identifiable healthcare information on computers.
Users in the healthcare industry should purchase the 5-hour "HIPAA Security
Fundamentals" class for security awareness training.
Will You Learn?
enterprise data, applications, and intellectual property
has become the critical issue for business decision makers
in the era of hackers and potential cyberterrorism. Like
attending a two-day seminar on security, this 10-hour class
provides non-technical, business-oriented information on
every key aspect of security.
learn about the types of threats against information security,
how to define security requirements for your organization,
and how to select the appropriate solutions to protect against
threats. You’ll learn about the attack timeline and
how to close the window of exposure. You’ll learn
about the different security technologies, and the advantages
and disadvantages of each.
also learn how to analyze risks, how to justify security,
and how to establish a security program within your organization.
You’ll learn about security policies, policy management,
and how to ensure your business continues to operate in
case of disaster.
Whether you are the person in charge of security, or
the network administrator, or the business manager
security, each of you has an important role. This course
is designed to assist you with your information
needs. At the end of the course, you will understand
your responsibility in security. And if you are
a security professional,
this course can be used to help prepare or review for
this course provide me with the information I need to convince
management of the need for a security program?
This course provides basic information on justifying security,
recognizing threats, and techniques for securing your enterprise.
other people in my organization take this course?
This course is designed for business managers, security
and network administrators, and even the CIO of your organization.
can I find out what topics will be covered in this course?
the Class Schedule to see what topics are covered each week.
company is located in Europe. Is this course still applicable
to someone who works outside of the USA?
The information you will learn can be applied to any company,
I be able to contact the instructor if I have questions or
need additional information?
Your instructor will be available via email to answer
there any specific hardware or software requirements that
must be met before I take this course?
The audio CDs require no special equipment except what
necessary to play a music CD. The integrated audio and
slide presentation require a PC.
and chief technology officer of Practical Security, Inc.,
Paul E. Proctor, has over 15 years experience in computer
security. Previously, Paul was founder and CTO at Centrax
Corporation and senior vice president of NFR Security. He
developed the Computer Misuse Detection System (CMDS), one
of the first commercially available host-based intrusion
detection systems while at SAIC, and was director of technology
at CyberSafe Corporation before joining NFR Security.
E. Proctor is the inventor of patented intrusion detection
technology and the author of two recent books, The Practical
Intrusion Detection Handbook, and The Secured Enterprise:
Protecting Your Information Assets (co-authored with F.
Christian Byrnes). Paul holds a Bachelor of Science degree
in mathematics and computer science from the University
Order the first module now for $24.95
10 hour course