IT Security, Control & Audit


Who Should Attend

This course should benefit IT personnel and MIS managers who are seeking to add or enhance their IT security knowledge in the above areas. Systems and network administrators who need a complete overview of the IT control and audit processes and any one who wants to have an understanding of IT security, control processes as well as the approach to IT auditing may also attend.

Facilitators
Duration
2 Days
Intakes & Registrations
Click on your preferred date below to register. Only online registrations will be accepted.

Intake 01

24 - 25 Jan 13

Intake 02

21 - 22 Mar 13

Intake 03

25 - 26 Apr 13

Intake 04

Intake 05

Intake 06

Intake 07

Intake 08

Fee
S$800 (Inclusive of GST)
Venue

All organisations use information systems today and they are usually connected to other systems via internal networks and/or the Internet. The risks from unauthorised access, unauthorised use of information, incorrectly configured systems, as well as inadequate
security monitoring and reports can cause the organisation's system to fail altogether and ruin the reputation and business of the enterprise.

This 2-day course provides a strong foundation for anyone concerned with IT security and controls. In addition, the course will also highlight approaches to IT/IS auditing. Specifically the course covers:


Course Outline

Part One - IT Security & Controls:

IT Security Management

Generic security concepts and principles
Current security trends
Information classification
Information risk assessment
Establishing security policies and procedures
Defense in depth mechanism
Security monitoring
Security awareness programmes
Security training

Operations Security

Threats, vulnerabilities and risks
Controls and protections
Problem Management
Change Management
Segregation of duties
Least Privilege
Physical security

Technical Security

Access control system
Overview of cryptographic techniques
Security tools for vulnerability assessment
Generic hacking process & tools
Intrusion detection

Unix & Database Security

O/S and server hardening
Unix vulnerabilities
Database store procedure
Trigger
View
Database vulnerabilities

Network Security

Implementing perimeter controls using:
Firewall
Router
VPN
Sniffer

Disaster Recovery & Business Continuity

Planning
Crisis management team
Disaster recovery planning - DRP
Business continuity planning - BCP
DRP & BCP events
Identification of key business functions and assets
Business Impact Analysis
Containment strategy
Defensive network, storage and back-up strategies
DRP and BCP drills & testing

Major Security Exploits

People and passwords
Operating systems
Configuration issues
Applications
Services
Lock-down strategy
Switches

Part 2 - Information Technology & Information

Systems Auditing:

IT/IS audit principles and concepts
Auditing strategies and processes
Auditing business applications
Auditing perimeter defenses
Network audit tools