AUDIT AND SECURITY OF NETWORKS, OPERATING SYSTEMS AND DATABASES

Content

Audit and Security of Networks

  • Principles of Data Communication
  • Communication Protocols
  • Network Management Protocols
  • Network Risks and Communication
  • Local Area Network

Networking, Encryption, Operating Systems and System Software Data Encryption

  • Types of Encryption and Practical Use Tools
  • Public Key Infrastructure
  • The Special Security Issues of Wireless Networking
  • Control of Mobile Computing

Operating Systems

  • Why Audit the Operating Systems?
  • The Nature of System Software
  • The Role of an Operating System
  • Operating System Security Standards
  • Practical Steps to the Audit of an Operating System

Programming Languages and Databases

  • System Development Controls
  • Change Management and How to Audit it

Database Systems

  • What is a Database?
  • Risks of Database Systems
  • Database Components: Tables and Views, Stored Procedures, Triggers
  • Database Audit Trails

Clients/Server Computing

  • Data, Business and Presentation Logic
  • Audit Issues in Client/Server Development
  • System Development Controls
  • Locating the Application Controls
  • Prototyping and RAD
  • Components and Reusable Software
  • Building and Evaluating a Client/Server Application

FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Database Administrators, Data Managers, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.

DATE:                  10th – 12th July,  2024

                                16th – 18th December, 2024

 

Category:

Objective

Networked applications are the lifeblood of modern businesses, being both an enabler and a significant area of high risk. Effective IT security and audit programs must ensure that these business enablers operate on a solid hardware and software infrastructure foundation to minimize risks and to improve compliance with many challenging regulatory requirements. In this highly practical, hands-on workshop, we identify the major data network and software infrastructure building block control points used to design, operate and secure modern distributed business applications. We also pinpoint major threats, risks and industry best practice controls associated with different distributed system scenarios.

Reviews

There are no reviews yet.

Be the first to review “AUDIT AND SECURITY OF NETWORKS, OPERATING SYSTEMS AND DATABASES”

Your email address will not be published. Required fields are marked *

Shopping Cart