PROGRAM SCHEDULE
Ref No: IT 102 Program Name: Data-Network-Security
Starts | Ends | Venue | Fees | Join Now |
29 Jan 2024 | 01 Feb 2024 | Dubai, UAE | $ 4,750 | Registration Closed |
22 Apr 2024 | 26 Apr 2024 | Amsterdam, NL | $ 5,750 | Registration Closed |
08 Jul 2024 | 12 Jul 2024 | London, UK | $ 5,750 | Registration Closed |
25 Nov 2024 | 29 Nov 2024 | Nairobi, KE | $ 5,250 | |
27 Jan 2025 | 31 Jan 2025 | Dubai, UAE | $ 4,750 | |
28 Apr 2025 | 02 May 2025 | Amsterdam, NL | $ 5,750 | |
07 Jul 2025 | 11 Jul 2025 | London, UK | $ 5,750 | |
24 Nov 2025 | 28 Nov 2025 | Nairobi, KE | $ 5,750 |
PROGRAM DETAILS
Introduction
Consumers, businesses and government rely on the Internet and web services for information and communications. Managing the transfer of data and access to it requires reliability, privacy and security in cyberspace. In this digital world, an attack on one computer may affect multiple systems. Unauthorized access may result in financial loss, the release of confidential information, damages to computer systems, costly staff time to restore operations and diminished reputation.
With the growing use of electronic data there is a growing need for privacy and security in cyberspace. The damage caused by unauthorized access can be considerable and include:
- Loss of funds due to fraud,
- Loss of confidential information,
- Damage to computer systems,
- Staff time and expense to restore operations,
- Embarrassing changes to websites by cyber vandalism and
- Diminished reputation.
Learning Objectives
The benefits of this program would be:
- Apply basic security measures and safeguard systems.
- To enable Secure networking and protect the valuable data
- To develop secure software applications
- To avoid unauthorized access to the network
Target Audience
The program is designed for:
- Corporate Employees working in IT environment
- IT professionals who are into software development and projects
- Anyone in the IT profession
- Anyone who uses IT for their business
Training Methodology
This practical and result-oriented program is based on adult learning concept. It incorporates:
- Short inspiring lectures with structured lessons from the learning manual;
- Captivating PowerPoint slides with case studies to enhance learning;
- Ongoing discussions with action planning;
- Ample time for Q&A;
- Group discussion and presentations;
- Quiz;
- Summary and recaps to reinforce key concepts within a fun learning environment.
Program Content
Day 1 – Types of Network
- Introduction
- Types of Network
- Network Components
- Hardware
- Software
- Summary
Day 2 – Network Threats
- Recap
- Network Vulnerabilities/ threats
- Hacking and Ethical Hacking
- Types of Firewalls
- Securing through Firewalls
- Virus and antivirus
- Summary
Day 3 – Hardware and Software Security
- Recap
- Hardware Component
- Hardware Security
- Software Components
- Software Security
- Routers and Switches security
- Summary
Day 4 – Wireless Security
- Recap
- Wireless components
- Wireless Network
- Wireless Security
- Mobile Security
- Summary
Day 5 – BCP and DRP
- Recap
- Business Continuity Planning
- Disaster Recovery Planning
- Team Presentation
- Summary
- Quiz