Information
Security Fundamentals
What is it?
How Much Does it Cost?
When is the Class?
Who Should Purchase This Class?
What Will You Learn?
Frequently Asked Questions
About the Instructor
What
is it?
"Information
Security Fundamentals" is a complete 10-hour course
that teaches security end-to-end. The training course is
based on the book, The Secured Enterprise: Protecting Your
Information Assets. The course includes a package containing
10 one-hour audio CDs, one presentation CD, and the book.
Order now and receive a free CD case!
With
our unique "learn while you drive" approach
to security, the audio CDs can be used to enforce what
you learned.
Presented
by Paul E. Proctor, Module 1, the first hour, is also available
as a self-paced tutorial and includes an audio CD.
Order
the first module now for $24.95
Order the
10 hour course
How
Much Does it Cost?
The
complete, ten-hour course is $395.00. Call us for volume
discounts (858.259.6204).
When
is the Class?
If
you are interested in attending an online, instructor-led
class, please contact
us.
Who
Should Purchase This Class?
-
Security Professionals
Learn about the tie between security and business, and how
to talk to your managers about security. Also prepare for
the CISSP examination.
- Network
and System Administrators
Expand your security knowledge to become more effective.
-
Business Line Managers
Learn about security in your business, and learn how important
your role is for effective information security.
- HIPAA
Security Managers
Learn how to secure individually identifiable healthcare information on computers.
Users in the healthcare industry should purchase the 5-hour "HIPAA Security
Fundamentals" class for security awareness training.
What
Will You Learn?
Securing
enterprise data, applications, and intellectual property
has become the critical issue for business decision makers
in the era of hackers and potential cyberterrorism. Like
attending a two-day seminar on security, this 10-hour class
provides non-technical, business-oriented information on
every key aspect of security.
You’ll
learn about the types of threats against information security,
how to define security requirements for your organization,
and how to select the appropriate solutions to protect against
threats. You’ll learn about the attack timeline and
how to close the window of exposure. You’ll learn
about the different security technologies, and the advantages
and disadvantages of each.
You’ll
also learn how to analyze risks, how to justify security,
and how to establish a security program within your organization.
You’ll learn about security policies, policy management,
and how to ensure your business continues to operate in
case of disaster.
Whether you are the person in charge of security, or
the network administrator, or the business manager
who needs
security, each of you has an important role. This course
is designed to assist you with your information
security
needs. At the end of the course, you will understand
your responsibility in security. And if you are
a security professional,
this course can be used to help prepare or review for
the CISSP.
Frequently
Asked Questions
Will
this course provide me with the information I need to convince
management of the need for a security program?
Yes.
This course provides basic information on justifying security,
recognizing threats, and techniques for securing your enterprise.
Should
other people in my organization take this course?
Definitely.
This course is designed for business managers, security
and network administrators, and even the CIO of your organization.
How
can I find out what topics will be covered in this course?
Download
the Class Schedule to see what topics are covered each week.
My
company is located in Europe. Is this course still applicable
to someone who works outside of the USA?
Yes.
The information you will learn can be applied to any company,
anywhere.
Will
I be able to contact the instructor if I have questions or
need additional information?
Yes.
Your instructor will be available via email to answer
questions.
Are
there any specific hardware or software requirements that
must be met before I take this course?
No.
The audio CDs require no special equipment except what
is
necessary to play a music CD. The integrated audio and
slide presentation require a PC.
About
the Instructor
Founder
and chief technology officer of Practical Security, Inc.,
Paul E. Proctor, has over 15 years experience in computer
security. Previously, Paul was founder and CTO at Centrax
Corporation and senior vice president of NFR Security. He
developed the Computer Misuse Detection System (CMDS), one
of the first commercially available host-based intrusion
detection systems while at SAIC, and was director of technology
at CyberSafe Corporation before joining NFR Security.
Paul
E. Proctor is the inventor of patented intrusion detection
technology and the author of two recent books, The Practical
Intrusion Detection Handbook, and The Secured Enterprise:
Protecting Your Information Assets (co-authored with F.
Christian Byrnes). Paul holds a Bachelor of Science degree
in mathematics and computer science from the University
of Illinois.
Order the first module now for $24.95
Order the
10 hour course
|