In this intensive three-day seminar, attendees will review learn the basic operating characteristics, threats, vulnerabilities and risks associated with modern LANs, WANs, intranets, extranets client/server and peer-to-peer networks, and other forms of networking and distributed computing architectures, including cloud-technologies. We will survey best practices for securing and auditing network applications, interconnection devices, and remote access and perimeter security services. We will also map and organize the use of built-in and add-on tools to security policy and audit requirements to determine the essential topics that must be addressed in compliance and risk management, security administration standards and procedures and audit programs. The anatomy of several recent celebrated attacks and the security failures which led to them will be discussed. You will receive security and audit checklists at the end of each control-related section.
Amsterdam, Atlanta, Ga, Bandar Seri Begawan, Boston, Ma, Burlington, Ma, Cape Town, Charlotte, Nc, Chicago, Il, Dallas, Tx, Denver, Co, Dubai, Dublin, Dublin, Oh, Hong Kong, Houston, Tx, Las Vegas, Nv, London, Manila, New York, Ny, Oman, Orlando, Fl, Philadelphia, Pa, San Antonio, San Diego, Ca, San Francisco, Ca, Seattle, Wa, Singapore, Virtual Training Room Only, Washington, Dc