Information Assurance Training:

Information Security and Assurance

Information Assurance Networking Fundamentals

On completion of this course you will be able to gain an understanding of information security, governance, risk and related standards and how these should be interpreted and applied to a business environment. Students will learn key topics including:principles of information security and assurance, information risk, information security frameworks, information security controls and legal, ethical and professional issues.

On completion of this course you will have developed your knowledge of network fundamentals, and will be equipped to challenge protocol assumptions and gauge the risks these protocols pose to the enterprise. Students will learn TCP/IP protocols and will develop their own capstone project.

Security Models and Architecture

Survivable Functional Units

On completion of this course you will have an applied understanding of key foundation elements in building secure architectures and how and when to use these elements. Students will learn topics including Authentication and Access Control, Lattice and Reference Monitors, Security Models, Unix Security, Windows Security, Cryptography, Software Security and Database Security, Mobile Security, Network Security, Protection Measures and Security Evaluation.

On completion of this course you will understand the hands-on management of a network in realtion to system survivability, information assurance principles, and networking concepts. Students will learn how to assess system risk, and will gain an understanding of survivable functional units and network and organisational artefact analysis.

Computer Crime and Digital Forensics

Incident Response and Computer Security

On completion of this course you will have gained an awareness of the nature of malicious cyber activity and the motivation of cyber-criminals in order to recognise and competently assess cyber threats. Students will learn the different types of cyber crime and malware, as well as how to apply incident response and cyber crime identification mechanisms, network, computer and malware forensics and the legal obligations and ethics involved.

On completion of this course you will have gained an understanding of the methodologies, tools and procedures for applying fundamental digital forensics when collecting data on both a live and a powered-off machine. Students will learn about Live Incident Response, Network-based forensics Forensic Duplication, Forensic Analysis Techniques and Online-based Forensics.

Cryptography and Security Mechanisms

Security Testing and Network Defence

On completion of this course you will have gained an understanding of the design requirements of secure systems in business, government and high security environments. Students will learn the history, principles and application of cryptography in business, government and high security environments. Studies will also include the design philosophies, processes and policies necessary to support security mechanisms and the history, design and application of security mechanisms.

On completion of this course you will have developed the technical skills necessary to conduct security tests against networks and the business skills needed to meet contemporary business and security needs. Students will learn how to apply an technical security baseline and an information security knowledge baseline, developing the skills necesary to undertake practical security testing and business security testing.