Education
Educating your personnel in IT security is the best defense to the increasing threat from hacker attacks, fraud, and viruses. Our specialized training solutions empower businesses to apply best practice to their IT security frameworks and protocols.
Extensive and Intensive Security Training
We can train anyone, anywhere in your organization to the level of IT security appropriate to their position.
From introducing directors and managers to the broader applications of IT security to providing individualized high-level training to dedicated IT security personnel, RedOracle can ensure that all of your staff are IT security-aware and prepared.
As the range of security threats and vulnerabilities evolves, so too do our training courses. We regularly update our courses to include analysis of new threats and the latest measures to counter them.
Closing the Security Skills Gap
Due to a lack of skilled IT security specialists, much of the training is aimed at new entrants to the IT security arena. This involves an integrated program of assessment, placement, mentoring, and certification training to deliver highly-skilled and motivated IT security staff to the marketplace.
Our specialized courses include:
- Ethical hands-on-hacking – how hackers work
- Security fundamentals for managers
- Security training and certification
- Introduction to forensics and incident response
Ad-hoc Course
Securing the network environment continues to be a major concern of all industries and government agencies. With the advent of the wireless environment, security issues have multiplied.
This seminar will help attendees thoroughly examine their operating environment from a policy and management perspective, as well as a technical point of view. Working with an experienced instruction team you will produce hands-on, applicable policy drafts, assessments, and review common and lesser-known verification tools.
Course Benefits:
- Highlights industry and government agency IT security concerns
- Presents both a policy and technical perspective on information security
- Skill enhancement with peer reviews and critiques - Effective assessment tools and solutions
- Develop strategies to improve your organization's security procedures
- Useful checklists, draft policy, best practices, tools, and other resources
- Includes hands-on practice exercises
Risk Assessment Process
- Prescreening process and results
- Qualitative risk analysis
- Best practice methods of risk analysis
Security Policy Statement Components
- Key components of an effective policy
- Twelve key corporate policies
- Case studies and critiques
- Draft an information security policy
Vulnerability Assessment Methodology
- Vulnerability assessment
- Penetration testing
- Ethical hacking
- General security reviews
Security Assessment Tools
- Shareware
- Freeware
- Custom created tools
- Port scanners and vulnerability scanners
- Results verification tools
Who Should Attend
CEOs, CFOs, Human Resources, Risk Managers, Auditors, Information Security Managers, Procurement, Senior Management, and Technical Managers.
Course Benefits:
- Highlights industry and government agency IT security concerns
- Presents both a policy and technical perspective on information security
- Skill enhancement with peer reviews and critiques - Effective assessment tools and solutions
- Develop strategies to improve your organization's security procedures
- Useful checklists, draft policy, best practices, tools, and other resources
- Includes hands-on practice exercises