AUDIT AND SECURITY OF NETWORKS, OPERATING SYSTEMS AND DATABASES
₦205,000.00
Content
Audit and Security of Networks
Principles of Data Communication
Communication Protocols
Network Management Protocols
Network Risks and Communication
Local Area Network
Networking, Encryption, Operating Systems and System Software Data Encryption
Types of Encryption and Practical Use Tools
Public Key Infrastructure
The Special Security Issues of Wireless Networking
Control of Mobile Computing
Operating Systems
Why Audit the Operating Systems?
The Nature of System Software
The Role of an Operating System
Operating System Security Standards
Practical Steps to the Audit of an Operating System
Programming Languages and Databases
System Development Controls
Change Management and How to Audit it
Database Systems
What is a Database?
Risks of Database Systems
Database Components: Tables and Views, Stored Procedures, Triggers
Database Audit Trails
Clients/Server Computing
Data, Business and Presentation Logic
Audit Issues in Client/Server Development
System Development Controls
Locating the Application Controls
Prototyping and RAD
Components and Reusable Software
Building and Evaluating a Client/Server Application
FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Database Administrators, Data Managers, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.
Networked applications are the lifeblood of modern businesses, being both an enabler and a significant area of high risk. Effective IT security and audit programs must ensure that these business enablers operate on a solid hardware and software infrastructure foundation to minimize risks and to improve compliance with many challenging regulatory requirements. In this highly practical, hands-on workshop, we identify the major data network and software infrastructure building block control points used to design, operate and secure modern distributed business applications. We also pinpoint major threats, risks and industry best practice controls associated with different distributed system scenarios.
Reviews
There are no reviews yet.
Be the first to review “AUDIT AND SECURITY OF NETWORKS, OPERATING SYSTEMS AND DATABASES” Cancel reply
Reviews
There are no reviews yet.