You are on page 1of 1

The Institute of Finance Management

Centre fo r ICT Research and Inn ovatio ns (Ci RI)


P . O Bo x 3 9 1 8, D ar E s Sa la a m , T e l : + 2 5 5 - 2 2 - 21 1 2 9 3 1 - 3 F ax : 2 55 - 2 2 - 2 1 1 2 93 5
w w w . if m . a c .t z

Workshop on ICT Security


About the Course
Information Technology has seen a tremendous advancement in its application and this has introduced other challenges especially to the
security of the networks and its application. With vulnerabilities and threats all over the world in Information Technology, this course aims to
provide practical knowledge which will help in the security of computers and networks in various environments and on how to check and
test for the possible loopholes and vulnerabilities. It is the duty of System Administrators, IT Officers and network security professionals to
guard their infrastructure against exploits by knowing the enemy The malicious hacker(s)-who seek to use the same infrastructure for
illegal activities. The course will also be useful for preparation for Certified Ethical Hacker Exam (CEH). Participants will gain a global
perspective on designing a secured system, identifying all security holes on their network and providing the solution. This workshop will
introduce participants to:

Introduction to ethical hacking, Foot printing and Reconnaissance

Scanning & Enumeration and System hacking

Trojans, Backdoors, Virus & Worms and sniffers

Social Engineering, Denial of Services and Session Hijacking

Hacking Web Servers, Web application vulnerabilities and SQL Injection

Evading IDS honey pots & Firewalls and wireless hacking

Cryptography and Penetration testing

Learning Outcome of the Course


At the end of the Course the participants would be able to:

Identify all security holes on their network and providing the solution

Protect Database against SQL Injection Attacks

Protect Host Server against Web Server Attacks

Protect Network or System Resources from Trojan and Backdoors

Protect confidential data such as Email Message, Person Data, Organisation Data e.t.c

Secure networks from Anomalous Traffic

Protect Wireless Network against Wireless Attacks

Target Group
This training is relevant to all ICT practitioners. Specifically the training will be useful to Network Administrators, System Analysts, Network
Programmers, Network Security Administrator, System and Network Engineers.
How to Apply
Download application form from IFM website http://www.ifm.ac.tz/documents/short courses/ICT security form.pdf Registration can be
made at IFM Block A, Room No. G20 or Alternative you can apply/ register through contact details below.
The participation fee per participant for this Workshop is Tzs 1,250,000 which will include course materials, refreshment and software tools.
IFM Certificates will be issued on successful completion of the course. You can pay at any CRDB Branch in Tanzania, Account Number:
01J1042984102, Account Name: The Institute of Finance Management.
Course Venue & Dates
The training is intended to be held in Morogoro from 16/02/2015 to 20/02/2015 Time 09:00AM 04:00PM.
And also Mwanza from 23/02/2015 to 27/02/2015 Time 09:00AM 04:00PM.
Contact Details
Mob: +255653525226 or +255752313145 Email : sultibra@gmail.com or sultan@ifm.ac.tz .

You might also like