Skip to main content

Education


Educating your personnel in IT security is the best defense to the increasing threat from hacker attacks, fraud, and viruses. Our specialized training solutions empower businesses to apply best practice to their IT security frameworks and protocols.

Redoracle Education

Extensive and Intensive Security Training

We can train anyone, anywhere in your organization to the level of IT security appropriate to their position.

From introducing directors and managers to the broader applications of IT security to providing individualized high-level training to dedicated IT security personnel, RedOracle can ensure that all of your staff are IT security-aware and prepared.

As the range of security threats and vulnerabilities evolves, so too do our training courses. We regularly update our courses to include analysis of new threats and the latest measures to counter them.

Closing the Security Skills Gap

Due to a lack of skilled IT security specialists, much of the training is aimed at new entrants to the IT security arena. This involves an integrated program of assessment, placement, mentoring, and certification training to deliver highly-skilled and motivated IT security staff to the marketplace.

Our specialized courses include:

  • Ethical hands-on-hacking – how hackers work
  • Security fundamentals for managers
  • Security training and certification
  • Introduction to forensics and incident response
Image
Image

Ad-hoc Course

Securing the network environment continues to be a major concern of all industries and government agencies. With the advent of the wireless environment, security issues have multiplied.

This seminar will help attendees thoroughly examine their operating environment from a policy and management perspective, as well as a technical point of view. Working with an experienced instruction team you will produce hands-on, applicable policy drafts, assessments, and review common and lesser-known verification tools.

Course Benefits:

  • Highlights industry and government agency IT security concerns
  • Presents both a policy and technical perspective on information security
  • Skill enhancement with peer reviews and critiques - Effective assessment tools and solutions
  • Develop strategies to improve your organization's security procedures
  • Useful checklists, draft policy, best practices, tools, and other resources
  • Includes hands-on practice exercises

Risk Assessment Process

  • Prescreening process and results
  • Qualitative risk analysis
  • Best practice methods of risk analysis

Security Policy Statement Components

  • Key components of an effective policy
  • Twelve key corporate policies
  • Case studies and critiques
  • Draft an information security policy
Image
Image

Vulnerability Assessment Methodology

  • Vulnerability assessment
  • Penetration testing
  • Ethical hacking
  • General security reviews

Security Assessment Tools

  • Shareware
  • Freeware
  • Custom created tools
  • Port scanners and vulnerability scanners
  • Results verification tools

Who Should Attend

CEOs, CFOs, Human Resources, Risk Managers, Auditors, Information Security Managers, Procurement, Senior Management, and Technical Managers.

Course Benefits:

  1. Highlights industry and government agency IT security concerns
  2. Presents both a policy and technical perspective on information security
  3. Skill enhancement with peer reviews and critiques - Effective assessment tools and solutions
  4. Develop strategies to improve your organization's security procedures
  5. Useful checklists, draft policy, best practices, tools, and other resources
  6. Includes hands-on practice exercises