IFM is organizing a workshop on ICT security. This workshop will describes how security controls will be implemented in the Organisation. It aims to provide practical knowledge which will help in the security of computers, networks and its application.
IFM is organizing a workshop on ICT security. This workshop will describes how security controls will be implemented in the Organisation. It aims to provide practical knowledge which will help in the security of computers, networks and its application.
IFM is organizing a workshop on ICT security. This workshop will describes how security controls will be implemented in the Organisation. It aims to provide practical knowledge which will help in the security of computers, networks and its application.
Centre fo r ICT Research and Inn ovatio ns (Ci RI)
P . O Bo x 3 9 1 8, D ar E s Sa la a m , T e l : + 2 5 5 - 2 2 - 21 1 2 9 3 1 - 3 F ax : 2 55 - 2 2 - 2 1 1 2 93 5 w w w . if m . a c .t z
Workshop on ICT Security
About the Course IFM is organizing a workshop on ICT security. ICT Security Policy is the foundation of Security Infrastructure. This workshop will describes how security controls will be implemented in the Organisation and also aims to provide practical knowledge which will help in the security of computers, networks and its application. This workshop shall cover :
Introduction to ethical hacking, Foot printing and Reconnaissance
Scanning & Enumeration and System hacking
Trojans, Backdoors, Virus & Worms and sniffers
Social Engineering, Denial of Services and Session Hijacking
Hacking Web Servers, Web application vulnerabilities and SQL Injection
Evading IDS honey pots & Firewalls and wireless hacking
Cryptography and Penetration testing
ICT Security Policy
Learning Outcome of the Course
At the end of the Course the participants would be able to identify all security holes on their network and providing the solution, Protect Network or System Resources from Trojan and Backdoors, Protect confidential data such as Email Message, Person Data & Organisation Data, and Capable of implementing and reviewing ICT Security Policy for their Organisation. Target Group This training is relevant to all ICT practitioners. Specifically the training will be useful to Network Administrators, System Analysts, Network Programmers, Network Security Administrator, System & Network Engineers. Accountants, Internal Auditors & External Auditors are also invited to attend. How to Register Registration can be done through Email : sultibra@gmail.com or sultan@ifm.ac.tz . Course Fee & Certification The participation fee per participant for this Workshop is Tzs 1,500,000 which will include course materials, refreshment and software tools. You can pay at any CRDB Branch in Tanzania, Account Number: 01J1042984102, Account Name: The Institute of Finance Management. IFM Certificates will be issued upon successful completion of the course. Course Venue & Dates Mwanza at Monarch Hotel from 31/08/2015 to 04/09/2015 Time 09:00AM 04:30PM Tanga at Tanga beach resort from 14/09/2015 to 18/09/2015 Time 09:00AM 04:30PM Dar es Salaam at IFM Main Campus from 21/09/2015 to 25/09/2015 Time 09:00AM 04:30PM Facilitator Ibrahim Sultan Computer Hacking Forensic Investigator, Network Analyst & ICT Security Consultant.. Contact Details For further information contact details Mob: +255653525226 or +255752313145