Understanding Modern Information Communication Technology Training Course
This course provides an overview of fundamental principles in security and IT security, focusing on protection against network-based threats. Participants will develop a solid understanding of critical security protocols and the security frameworks underlying web services. Additionally, the curriculum examines recent attacks targeting cryptosystems and highlights several associated vulnerabilities.
This course is available as onsite live training in Serbia or online live training.Course Outline
Course Objectives:
Networking Overview
Internet Architecture
Contemporary Network Solutions
Contemporary Network Implementation
Fiber Optic Technology
Clustering
Internet of Things (IoT)
Cloud Computing
Infrastructure as a Service (IaaS)
Virtualization
Emerging Implementation Strategies
Requirements
Professional experience in an IT or IT-adjacent role
Familiarity with network and internet fundamentals
Open Training Courses require 5+ participants.
Understanding Modern Information Communication Technology Training Course - Booking
Understanding Modern Information Communication Technology Training Course - Enquiry
Understanding Modern Information Communication Technology - Consultancy Enquiry
Upcoming Courses
Related Courses
BCS Practitioner Certificate in Information Risk Management (CIRM)
35 HoursTarget Audience:
This course is designed for professionals involved in information security and information assurance disciplines.
Learning Outcomes:
Upon completion, candidates will be able to demonstrate:
- The significant business benefits derived from effective information risk management.
- The ability to articulate and apply information risk management terminology accurately.
- Competence in conducting threat and vulnerability assessments, business impact analyses, and risk assessments.
- A thorough understanding of control principles and risk treatment strategies.
- Skills to present findings in a format suitable for developing a risk treatment plan.
- Proficiency in using information classification schemes.
Certified Chief Information Security Officer (CCISO)
35 HoursThe EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program.
The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Serbia (online or onsite) is designed for supply chain professionals who want to establish robust control and oversight over their supply chains, with a particular focus on cybersecurity.
By the end of this training, participants will be able to:
- Identify security oversights that can cause significant damage and disruption to the supply chain.
- Deconstruct complex security challenges into manageable and actionable components.
- Tackle common supply chain vulnerabilities by analyzing high-risk areas and engaging with stakeholders.
- Implement best practices for securing the supply chain.
- Significantly reduce or eliminate the most critical risks to an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Serbia (online or onsite) is designed for IT professionals and business leaders at an intermediate to advanced level who aim to develop a structured approach to handling data breaches.
Upon completion of this training, participants will be capable of:
- Comprehending the causes and implications of data breaches.
- Creating and executing strategies to prevent data breaches.
- Developing an incident response plan to contain and mitigate breaches.
- Performing forensic investigations and evaluating the impact of breaches.
- Meeting legal and regulatory obligations regarding breach notification.
- Recovering from data breaches and enhancing overall security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Grasp the fundamental concepts of the HiTrust CSF (Common Security Framework).
- Recognize the administrative and security control domains within the HITRUST CSF.
- Gain insights into the various assessment types and scoring methods used by HiTrust.
- Comprehend the certification procedure and specific requirements for achieving HiTrust compliance.
- Apply best practices and practical tips for successfully adopting the HiTrust approach.
PECB ISO 27005 Risk Manager
21 HoursThis training program teaches how information security risk assessment is conducted by integrating information from ISO/IEC 27005:2022 and ISO/IEC 27001. Alongside theoretical knowledge, the course includes practical exercises, quizzes, and case studies, making it a highly engaging learning experience.
Business Continuity Management
35 HoursDescription:
Designed as a 'Practitioner' level course, this program emphasizes hands-on exercises aimed at reinforcing key concepts and building participants' confidence in executing business continuity management strategies. The curriculum also fosters open debate, facilitating the exchange of knowledge and professional experience among attendees.
Participants will gain valuable insights from our trainers, who bring extensive practical experience as practicing business continuity management professionals and ISO 22301:2019 specialists.
Key Learning Outcomes:
- Articulate the importance of business continuity management (BCM) across all types of organizations
- Define the business continuity lifecycle
- Manage business continuity programs effectively
- Gain a deep understanding of their organization to identify mission-critical impact areas
- Develop a robust business continuity strategy tailored to the organization
- Establish an effective business continuity response framework
- Exercise, maintain, and review continuity plans
- Integrate business continuity principles into the organizational culture
- Define relevant terms and terminology specific to business continuity
Upon completion of the course, participants will possess a comprehensive understanding of all essential components of business continuity management, enabling them to return to their roles and make significant contributions to their organization's continuity efforts.
Snyk
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security issues in their code.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.