IT-SECURITY TRACK
From comprehensive and practical introduction in IT-Security
To hands on practical labs
At the SECO-Institute, we are aware of the growing worldwide need for competent, well-qualified security leaders and specialists. We satisfy this need by developing training programs that enable professionals like you to gain the skill set of an IT-Security Manager. With a SECO- S-CITSO certification, you will be recognised as a qualified Security Manager, and you will set yourself on a path of career success and continuous professional development.
Arjen Verhiel
Trainer
Network & Infrastructure consultant
Jochen den Oude
Trainer
Ethical Hacker
Cyber Security specialist
Dr. Rob van der Staaij
Trainer
IAM & IT-Infrastructure specialist
IT-Security Courses
Entry level
IT-Security Foundation
3 days
This course is suitable for officials who have a limited technical background but should be able to engage with technicians in their work; network or system administrators with ambitions to start a career in IT security, and aspiring information security professionals that lack technical security knowledge.
Build your IT security knowledge solid and from the ground up without having to immerse yourself deeply in information technology.
Hands-on online lab environments.
Practice attacker techniques and vulnerabilities evaluation. Identify companies’ critical assets and key IT systems that you’re assigned to monitor and protect.
Advanced level
IT-Security Practitioner
5 days
Security administrators, analysts, architects, auditors or consultants, looking to transition to an IT security management role.
Prepare for successful progression into an IT- security management role or lay the foundation for further specialization in the technical aspects of IT Security.
Solid basis in System-, Application- and Network Security, Cryptography and Identity & Access Management.
Hands-on practical labs.
Demonstrate an in-depth understanding of switches, routers, gateways, firewalls and intrusion detection systems;
Identify security measures to counter the OWASP Top 10.
Translate relevant legal, regulatory and standard requirements and industry-best practices to a company-wide cybersecurity framework.