IT-kurs
Du har valgt: Sikkerhetskurs for IT
Nullstill
Filter
Ferdig

-

69 treff i Sikkerhetskurs for IT
 

Oslo 5 dager 25 000 kr
19 Feb
09 Apr
11 Jun
(CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification. [+]
Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the not-for-profit International Information Systems Security Certification The certification itself is seen as the world’s premier certification for information security professionals. The CISSP Bootcamp includes in-depth & intense coverage of all ten domains plus tips and advice to prepare yourself for the exam. CISSP certification is not only an objective measure of excellence, but a globally recognized standard of achievement.    Andy Malone is a world class technology instructor and consultant. He is Microsoft MVP (Microsoft Most Valuable Professional) in Enterprise Security for 8 years, and instructor on a broad range of Security areas (CISSP, Comptia Security +, Cyber-Security & Awareness Training, Computer Forensics Training). Andy is a veteran conference speaker at prestigious events as Microsoft TechEd North America, Europe, Middle East & Africa, NIC, Windows Connections and Cybercrime. Andy`s passionate style of delivery, combined with a sense of fun has become his trademark and has won him great acclaim. Attending Andy`s classes you will learn about Microsoft’s Technologies and get hands on experience, but you will also get a wealth of knowledge, skills and additional “extras” which include whitepapers, tips, tricks, tools and a whole lot more! Follow Andy on Twitter @AndyMalone   The CISSP draws from a comprehensive, up-to-date, global common body of knowledge that ensures security leaders have a deep knowledge and understanding of new threats, technologies, regulations, standards, and practices. The CISSP exam tests ones competence in the 8 domains of the CISSP CBK, which cover:  Domain 1: Security and Risk Management (Security, Risk, Compliance, Law, Regulations, Business Continuity) Domain 2: Asset Security (Protecting Security of Assets) Domain 3: Security Engineering (Engineering and Management of Security) Domain 4: Communications and Network Security (Designing and Protecting Network Security) Domain 5: Identity and Access Management (Controlling Access and Managing Identity) Domain 6: Security Assessment and Testing (Designing, Performing, and Analyzing Security Testing) Domain 7: Security Operations (Foundational Concepts, Investigations, Incident Management, DisasterRecovery) Domain 8: Software Development Security (Understanding, Applying, and Enforcing Software Security) Module 9: CISSP Test Review Module 10: CISSP Exam Preparation & Review Questions Learning Objectives Understand and apply the concepts of risk assessment, risk analysis, data classification, and security awareness and Implement risk management and the principles used to support it(Risk avoidance, Risk acceptance, Risk mitigation, Risk transference) Apply a comprehensive and rigorous method for describing a current and/or future structure and behavior for an organizations security processes, information security systems, personnel, and organizational sub-units so that these practices and processes align with the organizations core goals and strategic direction and address the frameworks and policies, concepts, principles, structures, and standards used to establish criteria for the protection of information assets, as well as to assess the effectiveness of that protection and establish the foundation of a comprehensive and proactive security program to ensure the protection of an organizations information assets Apply a comprehensive and rigorous method for describing a current and/or future structure and behavior for an organizations security processes, information security systems, personne, and organizational sub-units so that these practices and processes align with the organizations core goals and strategic direction and examine the principles, means, and methods of applying mathematical algorithms and data transformations to information to ensure its integrity, confidentiality, and authenticity Understand the structures, transmission methods, transport formats, and security measures used to provide confidentiality, integrity, and availability for transmissions over private and Public communications networks and media and identify risks that can be quantitatively and qualitatively measured to support the building of business cases to drive proactive security in the enterprise. Offer greater visibility into determining who or what may have altered data or system information, potentially affecting the integrity of those asset and match an entity, such as a person or a computer system, with the actions that entity takes against valuable assets, allowing organizations to have a better understanding of the state of their security posture. Plan for technology development, including risk, and evaluate the system design against mission requirements, and identify where competitive prototyping and other evaluation techniques fit in the process Protect and control information processing assets in centralized and distributed environments and execute the daily tasks required to keep security services operating reliably and efficiently. Understand the Software Development Life Cycle (SDLC) and how to apply security to it, and identify which security control(s) are appropriate for the development environment, and assess the effectiveness of software security. [-]
Les mer
3 dager 15 000 kr
This 3-day course addresses the benefits of a sound IT Governance framework and explains how this can be realized using the best practice framework COBIT®. The elements .... [+]
Overview   This 3-day course addresses the benefits of a sound IT Governance framework and explains how this can be realized using the best practice framework COBIT®. The elements of the COBIT framework are explained using case studies and interactive presentations. This course features ”The COBIT Games” simulation where participants learn to apply COBIT principles in a city that is preparing to host the Olympic Games. An exam preparation module is included in the course preparing participants to take on the COBIT® Foundation Exam.    Key topics   • Identify key IT-management issues affecting organizations and understand the need for an IT Governance framework • Describe the COBIT Framework and components  • Describe COBIT resources and understand how they benefit business • Understand the components of COBIT and the role COBIT fulfils with respect to other IT-management frameworks • Understand how the COBIT framework can be applied for two sample COBIT processes, P010 and DS02  [-]
Les mer
3 dager 15 000 kr
This 3 day course offers training towards a free-standing Service Strategy qualification, but is also one of the Lifecycle modules leading to the ITIL Expert qualificatio... [+]
Overview   This 3 day course offers training towards a free-standing Service Strategy qualification, but is also one of the Lifecycle modules leading to the ITIL Expert qualification. The course covers all aspects of Service Strategy and is based upon the ITIL v3 core book of the same name.   Key topics   • Service Strategy Principles • Conducting Strategic Assessments • Service Portfolio Management • Driving Strategy Through The Service Lifecycle • Revision and Mock Examination • This is a closed book complex graded multiple-choice examination with 8 questions to be answered in 90 minutes. Students must get 70% correct in order to pass. • Defining Services and Market Spaces • Financial Management • Managing Demand • Critical success factors and risks associated with Service Strategy • Formal Examination  [-]
Les mer
5 dager 25 000 kr
This 5-day course explains the terminology, processes, roles, functions and activities relating to the Service Design phase of the IT Service Management Lifecycle, based ... [+]
Overview This 5-day course explains the terminology, processes, roles, functions and activities relating to the Service Design phase of the IT Service Management Lifecycle, based on Version 3 of the IT Infrastructure Library (ITIL). It is one of four “Service Capability” Modules, which are role-based. They offer participants a balanced knowledge of ITIL best practices. The Service Capability series will be of interest to participants who wish to be certified to a deep-level of understanding of ITIL V3 with the primary focus on the process activities and execution throughout the Service Lifecycle.   Examination candidates should be aware that at least 12 hours of personal study are required.   Key topics • Introduction • Service Catalogue Management • Demand Management • Financial Management • Roles and Responsibilities • Common Service Activities • Service Portfolio Management • Service Level Management • Supplier Management • Business Relationship Management • Technology and Implementation • Continual Service Improvement  [-]
Les mer
3 dager 15 000 kr
This 3-day course offers training towards the free-standing Service Operation qualification, but is also one of the Lifecycle modules leading to the ITIL Expert qualifica... [+]
Overview   This 3-day course offers training towards the free-standing Service Operation qualification, but is also one of the Lifecycle modules leading to the ITIL Expert qualification. The course covers all aspects of Service Operation and is based upon the ITIL v3 core book of the same name.   Key topics  • Introduction to Service Operation  • Common Service Operation Activities • Technology Considerations • This is a closed book complex graded multiple-choice examination with 8 questions to be answered in 90 minutes. Students must get 70% correct in order to pass.  • Service Operation Processes • Organizing Service Operation Functions • Formal Examination  [-]
Les mer
5 dager 25 000 kr
This 5-day course explains the terminology, processes, roles, functions and activities relating to the Service Transition phase of the IT Service Management Lifecycle, ba... [+]
Overview This 5-day course explains the terminology, processes, roles, functions and activities relating to the Service Transition phase of the IT Service Management Lifecycle, based on Version 3 of the IT Infrastructure Library (ITIL). It is one of four “Service Capability” Modules, which are role-based. They offer participants a balanced Knowledge of ITIL best practices. The Service Capability series will be of interest to participants who wish to be certified in a deep-level of understanding of ITIL V3 with the primary focus on the process activities and execution throughout the Service Lifecycle.   Examination candidates should be aware that at least 12 hours or personal study are required. [-]
Les mer
5 dager 25 000 kr
ISO/IEC Lead Auditor er et 5 dagers kurs som gir deltakerne mulighet til å utvikle ekspertisen som er nødvendig for å utføre en revisjon av et ISMS, samt å lede et t... [+]
This five-day intensive course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques. During this training, the participant will acquire the skills and knowledge needed to proficiently plan and perform audits compliant with the certification process of the ISO/IEC 27001:2013 standard. Based on practical exercises, the participant will develop the abilities (mastering audit techniques) and skills (managing audit teams and audit program, communicating with customers, conflict resolution, etc.) necessary to the efficient conducting of an audit. Les mer om kurset og agenda [-]
Les mer
3 dager 15 000 kr
The course covers all aspects of Service Design and is based upon the ITIL V3 core book of the same name. [+]
Overview    This 3 day course offers training towards a free-standing Service Design qualification, but is also one of the Lifecycle modules leading to the ITIL Expert qualification. The course covers all aspects of Service Design and is based upon the ITIL V3 core book of the same name.   Key topics   • Introduction to Service Design • Service Operation Processes • Organizing Service Design • Implementation Considerations • This is a closed book complex graded multiple-choice examination with 8 questions to be answered in 90 minutes. Students must get 70% correct in order to pass. • Service Design Principles • Technology Related Activities • Technology Considerations • Formal Examination [-]
Les mer
Bergen 2 dager 12 500 kr
09 Apr
This course enables the participants develop the competence to master the basic Risk Management elements related to all the assets of relevance for Information Security u... [+]
This course enables the participants develop the competence to master the basic Risk Management elements related to all the assets of relevance for Information Security using the ISO/IEC 27005 standard as a reference framework. Based on practical exercises and case studies, participants acquire the necessary knowledge and skills to perform an optimal Information Security Risk Assessment and manage risks in time by being familiar with their life cycle. This training fits perfectly in the framework of an ISO/IEC 27001 standard implementation process. Learning Objectives: To understand the concepts, approaches, methods and techniques that allow effective Risk Management according to ISO 27005 To interpret the requirements of ISO 27005 on Information Security Risk Management To understand the relationship between the Information Security Risk Management, the security controls and the compliance with all the other requirements) Day 1: Introduction, risk management program, risk identification and assessment according to ISO 27005 Concepts and definitions related to risk management Risk management standards, frameworks and methodologies Implementation of an information security risk management program Risk identification and risk assessment Day 2: Risk evaluation, treatment, acceptance, communication and surveillance according to ISO 27005 Risk evaluation and treatment Acceptance of information security risks and management of residual risks Information security risk monitoring and review Certified ISO/IEC 27005 ANSI Accredited Exam Sertifisering: About the Examination: The “Certified ISO 27005 Risk Manager” exam fully meets the requirements of the PECB Examination and Certification Program (ECP). The “Certified ISO 27005 Risk Manager exam covers the following competence domains: Domain 1: Fundamental concepts, approaches, methods and techniques of information security risk management Domain 2: Implementation of an information security risk management program Domain 3: Information security risk assessment based on ISO 27005 The exam is available in different languages, including English, French, Spanish and Portuguese The exam consists of 5 essay-type questions Open book: Participants may use all PECB provided documentation plus their own course notes, but will not be permitted to use any computer, laptop or any other electronic device Paper-based exam A minimum score of 70% is required to pass the exam The exam lasts 90 minutes Certification: A certificate of “ISO/IEC 27005 Risk Manager” will be issued to those participants who successfully pass the exam and comply with all the other requirements related to this credential: Professional experience: Two years, one year of Risk Management related work experience Risk assessment experience: Risk Management activities totaling 200 hours [-]
Les mer
3 dager 14 000 kr
This 3-day course introduces the concepts of IT Service Management (ITSM) based on Version 3 of the IT Infrastructure Library (ITIL). The IT Service Management Lifecycle. [+]
Overview This 3-day course introduces the concepts of IT Service Management (ITSM) based on Version 3 of the IT Infrastructure Library (ITIL). It describes the IT Service Management Lifecycle. It also provides a set of specialized organizational capabilities for providing value to customers in the form of services.    Key topics   • Service Management as a Practice • ITIL introduction • Introduction of the lifecycle stages • Introduction to key principles, models and concepts • Service Strategy, Service Design • Continual Service Improvement • Architecture and technology to manage the IT Services • Revision and Mock Examination  • Introduction to IT Service Management • Service Lifecycle • Key Principles, Models and Concepts • Concepts, Roles and Functions • Service Transition, Service Operation • Technology and Architecture • ITIL® Qualification Scheme [-]
Les mer
Nettstudier 2 semester 4 980 kr
På forespørsel
Skadelig programvare: sikkerhetshull, informasjonskapsler, virus og antivirus Nettverk: Virtuelle private nett (VPN), brannmur, demilitarisert sone (DMZ), tjenestenektang... [+]
Studieår: 2013-2014   Gjennomføring: Høst og vår Antall studiepoeng: 5.0 Forutsetninger: Ingen. Innleveringer: For å kunne gå opp til eksamen må 8 av 12 øvinger være godkjent. Personlig veileder: ja Vurderingsform: Skriftlig, individuell, 3 timer,  Ansvarlig: Olav Skundberg Eksamensdato: 16.12.13 / 26.05.14         Læremål: KUNNSKAPER:Kandidaten kan:- forklare hvordan en datamaskin utsettes for angrep gjennom skadelig programvare og hvordan man kan beskytte seg mot dette- beskrive ulike typer nettbaserte angrep og hvordan man kan beskytte seg mot dette- beskrive ulike krypteringsmekanismer og forklare hvordan digitale sertifikat brukes for å oppnå sikre tjenester.- referere til aktuelle lover og retningslinjer innen sikkerhet- gjøre greie for en organisasjonsmessig informasjonssikkerhetssikkerhetspolicy FERDIGHETER:Kandidaten kan:- kontrollere egen PC for skadelig programvare- kontrollere at installert programvare er oppdatert- utføre pakkefangst med Wireshark og tolke resultatet GENERELL KOMPETANSE:Kandidaten:- er bevisst på å holde programvare oppdatert og å bruke nettvett Innhold:Skadelig programvare: sikkerhetshull, informasjonskapsler, virus og antivirus Nettverk: Virtuelle private nett (VPN), brannmur, demilitarisert sone (DMZ), tjenestenektangrep Sikre tjenester: Krypteringsmetoder og sjekksum. Digitale sertifikater og Public Key Infrastructure (PKI) Samfunn og virksomhet: ekom-loven og personvernloven. Sikkerhetshåndbok og ISO27001Les mer om faget herDemo: Her er en introduksjonsvideo for faget Påmeldingsfrist: 25.08.13 / 25.01.14         Velg semester:  Høst 2013    Vår 2014     Fag Internett og sikkerhet 4980,-         Semesteravgift og eksamenskostnader kommer i tillegg.  [-]
Les mer
Oslo Trondheim 5 dager 25 000 kr
22 Jan
12 Mar
19 Mar
ISO/IEC Lead Implementer er et 5 dagers kurs som gir deltakerne mulighet til å utvikle Kompetanse for å supportere bedriften sin eller andre i å implementere og styre ... [+]
This five-day intensive course enables the participants to develop the expertise to support an organization in implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013. Participants will also master the best practices for implementing information security controls from the eleven areas of ISO/IEC 27002:2013. This training is consistent with the good practices of project management established by the Project Management Institute (PMI) and ISO 10006:2003 (Quality Management Systems - Guidelines for Quality Management in Projects). This training is fully compatible with ISO/IEC 27003:2009 (Guidelines for the Implementation of an ISMS), ISO/IEC 27004:2009 (Measurement of Information Security) and ISO/IEC 27005:2008 (Risk Management in Information Security). Les mer om kurset og agenda [-]
Les mer
2 dager 16 200 kr
Formål med kurset Vi blir stadig mer mobile i form av bærbare PC-er og annet trådløst utstyr. De aller fleste nye bærbare PC-er har trådløse nettverkskort inneb... [+]
“Wireless hacking” er et 2-dagers kurs fra Watchcom som kjøres i samarbeid med Zone-H. Kurset tar for seg de fleste aspekter rundt sikring av trådløse nett. Du lærer om svakheter som ofte utnyttes, hvilke konsekvenser dette kan ha for bedriften og ikke minst hvor lett det kan være å bryte seg inn. Kurset gjennomgår standarder som de ulike teknologiene baserer seg på, slik at kunnskapen fra kurset enkelt kan brukes i egen bedrift uavhengig av produkt. Kursinnhold Setter deg inn i hackerens ståsted Typiske teknikker for innbrudd i trådløse nett Hvilke svakheter det finnes i trådløs teknologi Hvordan beskytter man eget nettverk Sikkerhetstesting som en del av bedriftens policy Øvelser [-]
Les mer
3 dager 19 900 kr
Få en grundig gjennomgang av de viktigste temaer for CRISC eksamen Lær deg om IT risk management, hvordan du designer, implementerer, monitorerer og vedlikeholder et r..... [+]
Kursinnhold Dag 1: Risk Identification, Assessment and Evaluation Risk Response Spørsmål og praktiske øvelser relater til tema Dag 2: Risk Monitoring Information Systems Control Design and Implementation Spørsmål og praktiske øvelser relater til tema Dag 3: Information Systems Control Monitoring and Maintenance Spørsmål og praktiske øvelser relater til tema Prøveeksamen Læringsmålene for kurset er: - Å lære å identifisere, evaluere risikoer - Å lære og utarbeide tiltaksplan - Å lære om riskomonitoring - Å lære om kontrolldesign og implementering av kontroller - Å lære hvordan man tolker eksamenspørsmål og få andre eksamenstips - Å trene på eksamensspørsmål og oppgaver   Kursmateriell inneholder informasjon og praktiske eksempler, og vil bli distribuert til deltakerne. CRISC review manual 2015 er nødvendig for eksamen. Denne er ikke inkludert i prisen. Denne kan kjøpes her: http://www.isaca.org/Certification/CRISC-Certified-in-Risk-and-Information-Systems-Control/Prepare-for-the-Exam/Pages/Study-Materials.aspx [-]
Les mer
2 dager 12 500 kr
ISO 27001 Foundation er et innførings- og sertifiseringskurs i ISO 27001. Kurset gir deg en rask innføring i de beste metodene for implementering og administrering av e..... [+]
Lær deg om de beste metodene for å implementere og administrere et ISMS som spesifisert i ISO 27001: 2013. Kurset gir deg også kunnskap om de beste metodene for implementering av informasjonssikkerhetskontroller fra de 11 domenene i ISO 27002. Dette er et av våre mest populære kurs, så det lønner seg å være raskt ute for å sikre seg plass.  Målet for kurset er å lære deg: - Å forstå implementeringen av et ISMS i henhold til ISO 27001 - Å forstå forholdet mellom et ISMS, herunder risikostyring, kontroll og samsvar med kravene til ulike interessenter i organisasjonen - Å forstå begreper, tilnærminger, standarder, metoder og teknikker som tillater å effektivt håndtere et ISMS- Å tilegne seg nødvendig kunnskap for å bidra til å implementere et ISMS som spesifisert i ISO 27001   Kursinnhold Dag 1: Introduksjon til ISMS begreper som kreves av ISO 27001 Introduksjon til ISO 27000-gruppen av standarder Introduksjon til styringssystemer og prosesstilnærmingen Grunnleggende prinsipper om informasjonssikkerhet Generelle krav: presentasjon av punktene 4 til 8 av ISO 27001 Gjennomføringsfasen av ISO 27001 rammeverk Kontinuerlig forbedring av informasjonssikkerhet Gjennomføre en ISO 27001 sertifiseringsrevisjon Dag 2: Implementering av informasjonssikkerhetskontroller i henhold til ISO 27002 og sertifiseringseksamen Prinsipper og utforming av informasjonssikkerhetskontroller Dokumentasjon av informasjonssikkerhetskontrollmiljøet Overvåking og gjennomgang av informasjonsikkerhetskontroller Eksempler på implementering av informasjonssikkerhetskontroller basert på ISO 27002 beste praksis Sertifisert ISO / IEC 27001 Grunnleggende eksamen [-]
Les mer

Lukk Denne siden benytter seg av informasjonskapsler (cookies).
Du kan fortsette å bruke siden som vanlig hvis du godtar dette. Les mer om bruk av informasjonskapsler i vår personvernerklæring.
;