professional development training certificate program in information ... program in... ·...

2
PROFESSIONAL DEVELOPMENT TRAINING At RIT, our passion is seeking innovative and creative solutions to some of the world’s greatest challenges. We’ve assembled some of the most brilliant minds – professors, researches, and students – across several disciplines at one of the most sophisticated and high-tech campuses in the world. We have channeled all of that energy and our immense resources into one thing: the creation of new knowledge. For over 180 years RIT has been a launching pad – propelling its graduates into brilliant careers where they can apply their own passion for innovation and creativity to real-world problems and creating beautiful solutions. Our management development programs are an extension of our core mission and offer the following benefits: Customizable Content, Safeguarding of Proprietary/Sensitive Information and Expert Professionals. Results: Our programs give employees the necessary tools, confidence, and energy to: think strategically; redefine products; target new markets; cut costs; streamline supply chains; work collaboratively, to name just a few. More importantly, program participants feel empowered to initiate the changes necessary to ensure that the organization is continuously moving in the right direction. RIT Dubai’s total commitment to security training is evident by offering four integrated training workshops with the highest-quality of teaching and guidance. RIT’s Expert instructors prepare class attendees for real world security challenges by sharing their knowledge in critical areas of network security. Over a five day intense delivery model, attendees learn about techniques and methodologies to successfully configure, execute, construct, and troubleshoot network security to ensure the threat of viruses, worms, trojans and improper configuration is minimized or negated. Workshops goals: The workshops are aimed at professional security experts. Our workshop series employs the highest quality curriculum and courseware de- signed from a security-basics point-of-view. The training provides instant references and information. The workshop incorporates blended learning. In addition the training provides information on organizational and infrastructure baseline security issues, improvement in IT knowl- edge and skills required to execute and establish secure IT methods, and personal, one-on-one mentoring by course instructor and incorpo- rates self-guided hands-on lab materials. Fundamentals of Information Security Liability Network attacks Detection Defense mechanism Wireless Network Security Packet and Protocol Wireless Security Assess security of wireless networks Latest security standards Wireless Intrusion Prevention Systems Computer Forensics Tracing of illegal activities Recovering data Uncovering hidden or encrypted data Creating effective computer crime policy and its implementation Enterprise Security Enterprise Security Planning Security Policy and Procedures Network Security Design issues Network Security Management and Implementation Certificate Program in Information and Network Security

Upload: lexuyen

Post on 28-Feb-2018

214 views

Category:

Documents


1 download

TRANSCRIPT

PROFESSIONAL DEVELOPMENT TRAINING

At RIT, our passion is seeking innovative and creative solutions to some of the world’s greatest challenges. We’ve assembled some of the most brilliant minds – professors, researches, and students – across several disciplines at one of the most sophisticated and high-tech campuses in the world. We have channeled all of that energy and our immense resources into one thing: thecreation of new knowledge. For over 180 years RIT has been a launching pad – propelling its graduates into brilliant careers where they can apply their own passion for innovation and creativity to real-world problems and creating beautiful solutions. Our management development programs are an extension of our core mission and offer the following benefits: Customizable Content, Safeguarding of Proprietary/Sensitive Information and Expert Professionals.

Results:Our programs give employees the necessary tools, confidence, and energy to: think strategically; redefine products; target new markets; cut costs; streamline supply chains; work collaboratively, to name just a few. More importantly, program participants feel empowered to initiate the changes necessary to ensure that the organization is continuously moving in the right direction.

RIT Dubai’s total commitment to security training is evident by offering four integrated training workshops with the highest-quality of teaching and guidance. RIT’s Expert instructors prepare class attendees for real world security challenges by sharing their knowledge in critical areas of network security. Over a five day intense delivery model, attendees learn about techniques and methodologies to successfully configure, execute, construct, and troubleshoot network security to ensure the threat of viruses, worms, trojans and improper configuration is minimized or negated.

Workshops goals:The workshops are aimed at professional security experts. Our workshop series employs the highest quality curriculum and courseware de-signed from a security-basics point-of-view. The training provides instant references and information. The workshop incorporates blended learning. In addition the training provides information on organizational and infrastructure baseline security issues, improvement in IT knowl-edge and skills required to execute and establish secure IT methods, and personal, one-on-one mentoring by course instructor and incorpo-rates self-guided hands-on lab materials.

Fundamentals of Information Security

• Liability• Network attacks• Detection• Defense mechanism

Wireless Network Security• Packet and Protocol Wireless Security• Assess security of wireless networks • Latest security standards

• Wireless Intrusion Prevention Systems

Computer Forensics• Tracing of illegal activities• Recovering data• Uncovering hidden or encrypted data• Creating effective computer crime policy and its implementation

Enterprise Security• Enterprise Security Planning• Security Policy and Procedures• Network Security Design issues• Network Security Management and Implementation

Certificate Program in Information and Network Security

linkedin.com/RITDubai

twitter.com/RITDubai

fb.com/RITDubaiDevelopment Director - RIT DubaiEmail: [email protected]/dubaiPhone: +971 4 371 2000

For detailed information on each seminar contact:

Rochester Institute of Technology A Leading U.S. University

Information Network Security Experts: Charles Border Networking, Security, and Systems AdministrationCharles Border is an expert on computer security, system administration, spyware, networking and higher education issues. His teaching concentrates on system administration and he has also taught networking courses. Border has a Ph.D. in Higher Education Administration from the University of Buffalo and an MBA with concentration in Finance and Management Information Systems from the University of Buffalo. He is comfortable talking about a range of issues related to networking and system administration and is in the process of developing expertise in computer and enterprise security.

Andrew Marrington Andrew Marrington received his PhD in digital forensics from Queensland University of Technology (QUT), where he studied at the Information Security Institute. Marrington’s primary field of research is digital forensics, although he is also interested in other aspects of information security. He has presented his research at the top scientific conferences on digital forensics, including IFIP Working Group 11.9 on Digital Forensics, and the Digital Forensics Research Workshop. Marrington has consulted (both privately and through universities) on digital forensics, network security and systems administration for private and public sector customers, including an Australian Government defense agency.

Tae OhNetworking, Security, and Systems AdministrationB. Thomas Golisano College of Computing & Information SciencesTae H. Oh received a B.S. degree in Electrical Engineering from Texas Tech University in 1990 and M.S. and Ph.D. degrees in Electrical Engineering from Southern Methodist University (SMU) in 1995 and 2001, respectively. Before joining RIT, he worked for several telecom and defense companies like Ray-theon (Communication Systems Engineer: 1990-1995), Nortel Networks (Senior Software Engineer: 1995-1999), Ericsson (Systems Engineer: 1999-2001) and Ceterus Networks (Senior Systems Architect: 2002-2003) and Rockwell Collins (Principle Systems Engineer: 2003-2008) in the area of military communication systems, circuit switching, ATM, MPLS, wireless networks and MANET. He also taught MPLS, IP and Network Management courses at SMU as an adjunct professor (2004-2008).

Rajender K RajNetworking, Security, and Systems AdministrationRajendra K. Raj is a Professor of Computer Science at the Rochester Institute of Technology. His current research interests span large scale data management (“Big Data”), distributed systems, and privacy/security, especially related issues in cloud data management and mobile computing, and applied to a variety of domains including healthcare, finance and critical infrastructure protection. Raj also works on Computer Science education issues including curriculum design and program assessment. Prior to RIT, he served as a Vice President in Information Technology at Morgan Stanley & Co. in New York, where he de-veloped and managed leading edge global distributed database infrastructures for a variety of financial applications. For his Ph.D. from the University of Washington, Seattle, he investigated software composition and reuse in object-oriented languages and systems. B.S. and M.S., Shanghai Normal University, Ph.D., Binghamton University. His research areas are computer wired and wireless networks, soft computing, artificial intelligence, information retrieval and natural language processing.

Bill StackpoleNetworking, Security, and Systems AdministrationB. Thomas Golisano College of Computing & Information SciencesNetworking, Systems Administration, Network and System Security, Encryption and Cryptography, PGP and PKI, Hardware/Software Integration, Scripting, Real-Time Data Collection, Computer forensics and Data Recovery.

Paul TymannNetworking, Security, and Systems AdministrationPaul Tymann is Professor and Chair of the Computer Science Department at the Rochester Institute of Technology. He has taught both basic and advanced programming techniques for over 20 years. Professor Tymann has authored several books including: Modern Software Development Using Java. His initial research focused on the development of algorithms for parallel computers, but more recently has focused on bioinformatics. Prior to entering academia, Professor Tymann worked in industry developing control software for point of sale terminals. His most recent consultancy was to assist in the design and development of an inventory management system, being written by a software development company in Edinburgh Scotland. For the past five years he has worked in the area of bioinformatics and has completed joint software development projects at the University of Rochester and Rutgers University. Profes-sor Tymann is a member of the AP Computer Science Development Committee and has served as a reader for the AP exam for several years. In addition to teaching in the United States, Professor Tymann has taught at the University of Zimbabwe in Zimbabwe and at the University of Osnabrück in Germany.

Mike YacciNetworking, Security, and Systems AdministrationMichael Yacci is an expert in instructional technology and e-learning. He is a professor of Information Sciences and Technology, associate dean for Academic Affairs in the Golisano College and director of the master’s of Human Computer Interaction program. Yacci holds a PhD in Instructional Design, Develop-ment, and Evaluation from Syracuse University. He is a co-author of Structural Knowledge: Techniques for Representing, Conveying, and Acquiring Structural Knowledge, a handbook for supporting the assessment and use of structural knowledge in learning and instructional settings.