[ BACK UP ]
Course Aims
- To promote, train and certify participants’ competence in applying best practice in IT security.
- Protect against hacking and theft, and evaluate security products and solutions.
- Protect a computer, device or network from viruses and other malware, and guard against fraud and theft.
- Develop an effective security strategy to prevent unauthorised access to devices and data.
- Follow best practice for backing up and restoring sensitive data, and securely dispose of data and devices.
- Evaluate software, firewalls and other solutions to maximise home and workplace security.
Course Content
On completion of this course the candidate will:
- Security Concepts: Understand and identify the main concepts underlying the secure use of ICT in daily life including protection against data threats, cybercrime, hacking, unauthorised access to business & personal data, personal security, identity theft, social engineering, file security, macros, encryption, etc.
- Malware: Explain the term malware and how it can be concealed, types of infectious malware, types of data theft, protection measures, anti-virus software and its limitations.
- Network Security: Outline the types of network, connection options and their security implications. Explain the role of the network administrator. Understand the functions of a firewall and use relevant techniques and applications to maintain a secure wireless network connection. Understand network access control procedures.
- Secure Web Use: Understand the issues relating to safe web browsing, including purchasing and financial transactions. Be aware of issues in relation to pharming, digital certificates, one-time passwords, completing on-line forms, cookies. Delete private data from a browser and use content control software.
- Social Networking: Understand the importance of not disclosing confidential information, apply appropriate social networking account privacy settings. Understand potential dangers from cyber bullying, grooming, dangerous information, false identities, fraudulent links, etc.
- Communications: Understand and apply email security measures, e.g., encryption, digital signature. Understand concepts and dangers in relation to phishing. Understand the concept of instant messaging, related security vulnerabilities and confidentiality measures.
- Secure Data Management: Understand how to ensure physical security of devices and best practice for data back-up and restore procedures. Securely dispose of data and devices, using a range of methods to permanently delete or destroy data.
Entry Requirements
Participants should have general knowledge of information technology applications.
Duration/Start
October, Tuesday, 7pm – 10pm, 8 weeks.
Fee
€295 Exam fees not included