Information technology auditors, information security experts eager to enhance their system security audit abilities, system and network administrators.
Basic network and operating system (Windows and Unix) information, familiarity with peripheral protection systems.
4 Days.
Attendees will learn how to use security vulnerability scanners. Attendees will also learn how to conduct security audit of operating systems, peripheral protection systems and web applications.
This website uses cookies to ensure you get the best experience on our website. Cookies Policy
GOT IT