view cart | home | contact us | search

The World of Data Security *NEW*

Printer-friendly PDF version

Data security breaches are becoming more common as our data offers more value to those who would exploit it. These breaches can cause significant harm to consumers and organizations, Businesses of all types are working to understand and prepare for these attacks, and incorporating various mitigation strategies to prevent these events from occurring or minimize their impact. The World of Data Security will help the learner speak the language of data security with accuracy and confidence. It provides a foundational understanding of the security terms and concepts likely to arise within organizations and in discussions with customers. Throughout the session, practical examples illustrate the concepts.

Learning Objectives

After completing this course, the learner will be able to:
• List several types of security threats and ways to mitigate them
• Explain the difference between authentication, authorization and encryption
• Describe the operation of public key infrastructure and digital certificates at a high level
• Describe the role of IPSec
• Understand the main security mechanisms used in LTE and WiFi wireless networks
• Articulate the main concerns in device security and the approaches to address these concerns
• Explain at a high level what is involved with PCI compliance

Intended Audience

This solution is designed for executives and B2B account teams; it can also serve as an introduction to data security for sales engineers and architects new to the domain.

Course Length

0.5 day

Course Outlines / Knowledge Knuggets

1. Security Threats
1.1. The growing security problem
1.2. Types of threats
1.2.1. Attacks on data
1.2.1.1. Data at rest
1.2.1.2. Data in transit
1.2.2. Attacks on networks
1.2.3. Exploiting people
1.2.4. Exploiting software
1.3. Example: Security in the news

2. Foundations of Data Security
2.1. Authentication
2.2. Authorization
2.3. Ciphering/encryption
2.4. Public key infrastructure
2.5. Example: Security on the Web

3. End-to-End Security
3.1. Devices and applications
3.2. Networks
3.2.1. Wireline
3.2.1.1. Firewalls
3.2.1.2. Intrusion detection systems
3.2.2. Wireless
3.2.2.1. LTE
3.2.2.2. WiFi
3.3. Between networks (VPNs)

4. Security is a Process
4.1. Security and regulatory standards
4.1.1. Common criteria
4.1.2. PCI, FIPS, HIPPA, NIST
4.2. Exercise: End-to-end security

------------------------------------
WHY CUSTOMERS LOVE OUR ELEARNING:

- Self-paced, animated, and interactive

- $150/each course for 6 month license

- Immediate online access upon purchase

- Flexible way to take training at any hour

- Online training transcript available

- Electronic certificates at completion


- Full list of courses at
  www.awardsolutions.com/elearning.pdf

CONTACT US

For any additional questions,
please contact Mr. Rod Marckese
at +1-972-664-0727 x246 or
public.training@awardsolutions.com

Award Solutions, Inc.    2100 Lakeside Blvd., Suite 300, Richardson, TX    Contact Us 
© 2016 Award Solutions, Inc. All rights reserved.