The Course will cover the following Key areas:
· Current cyber threats and cyber security site references
· Government-mandated directives and compliance requirements
· Cyber roles required to successfully design secure systems
· The attack cycle perpetrated by malicious hackers
· Enterprise policy requirements
· Best strategies for securing the enterprise with layered defenses
· How security zones and detailed logging augment information assurance
· Forensic challenges and incident response planning
· Risk management process
· Goals achievable with auditing, scanning, and testing systems
· Industry recommendations for maintaining secure access control
Standards-based cryptographic solutions for securing communicationsSteve Njenga,
The e-Enhancement Centre
Ring Road, Westlands
Nairobi Kenya
+254 721 749 239, +254 752 546 676.
--
You received this message because you are subscribed to the Google Groups "Monrovia GTUG" group.
To unsubscribe from this group and stop receiving emails from it, send an email to monrovia-gtu...@googlegroups.com.
To post to this group, send email to monrov...@googlegroups.com.
Visit this group at http://groups.google.com/group/monrovia-gtug?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.