Information Technology Seminars
NMP Consulting offers several seminars to help raise awareness of security issues within your organization. The targeted audience is both end users and IT professionals.
- Social Engineering - The “Forgotten” Network Intrusion Tool (SE101)
Several different tools are implemented to protect networks from outside attacks, either through the internet or other means. The “forgotten” intrusion tool is exploitation of the human element in your business to successfully penetrate your network or databases. This course will describe the techniques used by social engineers and offer suggestions on how to protect your systems from this effective type of attack. Raising awareness if this type of attack will help your organization identify and prosecute people who are attempting to gain unauthorized access to your business.
- Protecting Home and Small Business Computer Systems (SC101)
More and more people are bringing work home after hours or are telecommuting from their residence. Many companies offer secure connections to internal networks from remote locations. However, if the remote workstations are not secure, they can be used as a launching point for attacks against the secure network. This course will describe techniques that businesses and home users can use to protect the remote workstation from being compromised. It will also show you how to protect valuable, hidden data on your remote workstation that many people are unaware exists. This course will also teach your personnel to discover where attacks against a secure network may have originated, and to secure their own remote workstations.
- Basics of Identifying and Securing Electronic Evidence (LE101)
With increasing frequency, IT personnel are tasked with investigating incidents of credit card fraud, identity theft, e-mail stalking and harassment, and other computer-based criminal activity. As the initial responder to a reported incident, these employees may have to secure electronic evidence that originates from or is stored on computer systems. Evidence of these crimes is often lost, or is ruled inadmissible in court if not secured properly. This course will provide a basic understanding of electronic storage techniques, as well as how to preserve data and protect it from accidental deletion or corruption until it is sent out for analysis or handed over to the proper authorities. It will also teach basic understanding of e-mail routing to simplify sender identification.
- Biometrics, Access Cards, and Computer Security (CS102)
Network managers employ many different methods to protect access to sensitive data. This is accomplished through biometrics, passwords, and other access controls including fingerprint scanners, retinal scanners, facial recognition, Smart Cards and physical access protections. This course will cover the different methods of providing protection to physical areas and computer systems, as well as the effectiveness of each method. Additionally, password security will be discussed, including best practices and policies for this commonly used protection method.
- The “Hacking” Culture (SE102)
“Black Hats,” “White Hats,” “Script-Kiddies,” “Hackers,” “Crackers,” and being “leet” are all terms that are a product of the “Hacking” culture. This course will describe this culture and the types of people that are a part of this sometimes underground community, as well as where they gather and the motivation behind their activities. This course will also help your personnel identify “hackers” and understand what drives them to this type of activity.
- Computer Security Basics (CS201)
The terminology and methods used in the field of IT security change rapidly, and can be confusing to those not well versed in computer and network systems. This course will cover the terms and methods used by IT security personnel in layman’s terms, as well as help convey an understanding of the everyday vernacular and methodology used in this industry. This course will also give personnel the knowledge to help them decipher s-mails and other written and verbal communications.
- Advanced Security Methodologies (CS202)
1.5 - 2 hours
This course is a continuation of Computer Security Basics (CS201) that will delve into the actual software and methods used for the prevention of attacks, as well as other network and computer intrusions. This course is geared to more technically-minded individuals such as System Administrators, Network Engineers and IT Support/Help Desk Staff.