Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

GIAC Information Security Fundamentals (GISF)

Course Cover
compare button icon

Course Features

icon

Duration

5.21 hours

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

5.21 hours

Course Description

Security professionals who want to prove their ability to work in IT systems with security tasks. Candidates must demonstrate a deeper understanding of information security than simple terminology.

Application Security The candidate must demonstrate an understanding of how to protect applications from malware and other common threats.

Computer Math The candidate must have a good understanding of foundational numbering system.

Cryptographic Algorithms & Attacks The candidate will demonstrate a good understanding of cryptographic algorithms.

Cryptography Fundamentals The candidate will have a good understanding of cryptography and its applications.

History of Cryptography: The candidate will be able to demonstrate an understanding of cryptography throughout the history.

Network Addressing and Protocols: The candidate will demonstrate a good understanding of protocol and network addressing.

Network Attacks The candidate must demonstrate a solid understanding of network attacks.

Network Communication Fundamentals: The candidate must have a good understanding of network terminology and concepts.

Network Security Technology The candidate must demonstrate an understanding of countermeasures, technologies used to minimize attacks' risks.

Principles of Security Policy and Risk Management The candidate will be able to demonstrate an understanding of the fundamental concepts of information security and risk management, as well as the components that make up effective policy creation and awareness programs.

Systems Security The candidate must demonstrate an understanding of how to secure systems from common threats.

Wireless Security Technology: The candidate will need to be able to understand wireless technologies and the defenses that are used to minimize the risks of wireless attacks.

Course Overview

projects-img

Virtual Labs

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Hands-On Training,Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

No prerequisites mentioned

What You Will Learn

Incident Management

Network Security

Course Instructors

Mohamed Atef

Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
Course Cover