exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

tissa.ps

tissa.ps
Posted Aug 17, 1999

Course: Telecommunications for Information Systems Security Analyst - 1994-10-20

tags | paper
SHA-256 | 5632fe4e0e907ecec330e5546792e002d9194e6f598cabecd0b9e1b8fb0058ae

tissa.ps

Change Mirror Download
                               TABLE OF CONTENTS

COURSE TITLE

COURSE NAME PAGE

A FRAUD UPDATE: FORENSIC AND INVESTIGATIVE AUDITING . . . . . . . . . . . 24

A PRACTICAL APPROACH TO CERTIFYING A SYSTEM . . . . . . . . . . . . . . . 83

ADP SECURITY OFFICERS (ADPSO) CONCEPTS . . . . . . . . . . . . . . . . . 2

ADVANCED DATA COMM NETWORKS: SECURITY/AUDITABILITY. . . . . . . . . . . . 55

ADVANCED EDP AUDITING - GBA 577 . . . . . . . . . . . . . . . . . . . . . 79

ADVANCED TECHNOLOGY CONFERENCE. . . . . . . . . . . . . . . . . . . . . . 10

ADVANCED NETWORK SECURITY ARCHITECTURE. . . . . . . . . . . . . . . . . . 75

AIS SECURITY STRATEGIES . . . . . . . . . . . . . . . . . . . . . . . . . 60

APPLICATION SECURITY REVIEWS. . . . . . . . . . . . . . . . . . . . . . . 30

ARCHITECTURE FOR SECURE SYSTEMS . . . . . . . . . . . . . . . . . . . . . 73

AUDIT SOFTWARE FOR THE 21ST CENTURY . . . . . . . . . . . . . . . . . . . 48

AUDIT AND SECURITY OF CLIENT/SERVER ARCHITECTURES . . . . . . . . . . . . 24

AUDIT AND SECURITY OF RELATIONAL DATABASES AND APPLICATIONS . . . . . . .
57

AUDIT AND CONTROL OF END-USER COMPUTING (EUC) . . . . . . . . . . . . . . 40

AUDIT AND CONTROL OF ELECTRONIC DATA INTERCHANGE. . . . . . . . . . . . . 39

AUDIT, CONTROL, AND SECURITY OF LAN AND MAINFRAME CONNECTIVITY. . . . .
. 31

AUDITING EDI APPLICATIONS . . . . . . . . . . . . . . . . . . . . . . . . 47

AUDITING THE DATA CENTER FOR CONTROLS, EFFICIENCY, AND
COST-EFFECTIVENESS. . . . . . . . . . . . . . . . . . . . . . . . . . 68

AUDITING THE DATA CENTER (M2020). . . . . . . . . . . . . . . . . . . . . 36

AUDITING FRAUD: PREVENT, DETECT, & CONTROL. . . . . . . . . . . . . . . . 54

AUDITING ADVANCED INFORMATION TECHNOLOGY. . . . . . . . . . . . . . . . . 51

AUDITING CLIENT/SERVER TECHNOLOGY . . . . . . . . . . . . . . . . . . . . 49

AUDITING SYSTEM DEVELOPMENT: NEW TECHNIQUES FOR NEW TECHNOLOGIES.
. . . . 47

AUDITING DATACOMM NETWORKS. . . . . . . . . . . . . . . . . . . . . . . . 50

AUDITING INFORMATION SYSTEMS. . . . . . . . . . . . . . . . . . . . . . . 41

AUDITING THE SYSTEMS DEVELOPMENT PROCESS. . . . . . . . . . . . . . . . . 70

BASIC SECURITY FOR PC USERS . . . . . . . . . . . . . . . . . . . . . . . 44

BASICS OF COMPUTER SECURITY . . . . . . . . . . . . . . . . . . . . . . . 18

BECOMING AN EFFECTIVE DATA SECURITY OFFICER . . . . . . . . . . . . . . . 53

BUILDING INFORMATION SECURITY AWARENESS . . . . . . . . . . . . . . . . . 27

BUSINESS RESUMPTION PLANNING (M2046). . . . . . . . . . . . . . . . . . . 21

BUSINESS FRAUD (M2008). . . . . . . . . . . . . . . . . . . . . . . . . . 38

BUSINESS IMPACT ANALYSIS. . . . . . . . . . . . . . . . . . . . . . . . . 85

BUSINESS IMPACT ANALYSIS (M2044). . . . . . . . . . . . . . . . . . . . . 21

CASE STUDIES IN MULTILEVEL SECURE NETWORKING. . . . . . . . . . . . . . . 13

COMMUNICATION SECURITY PRINCIPLES & PRACTICES . . . . . . . . . . . . . . 66

COMMUNICATIONS TECHNOLOGIES . . . . . . . . . . . . . . . . . . . . . . . 86

COMPREHENSIVE INFOSEC SEMINAR . . . . . . . . . . . . . . . . . . . . . . 66

COMPUSEC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

COMPUTER VIRUSES SEMINAR. . . . . . . . . . . . . . . . . . . . . . . . . 84

COMPUTER SECURITY FOR THE END-USER. . . . . . . . . . . . . . . . . . . . 80

COMPUTER SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

COMPUTER SECURITY SEMINAR . . . . . . . . . . . . . . . . . . . . . . . . 64

COMPUTER CRIME & INDUSTRIAL ESPIONAGE . . . . . . . . . . . . . . . . . . 82

COMPUTER SECURITY AWARENESS TRAINING . . . . . . . . . . . . . . . . . . 3

COMPUTER SECURITY FOR EXECUTIVES. . . . . . . . . . . . . . . . . . . . . 3

COMPUTER SECURITY FOR SECURITY AND MIS PROFESSIONALS. . . . . . . . . . . 43

COMPUTER SECURITY AND PRIVACY . . . . . . . . . . . . . . . . . . . . . . 67

COMPUTER SECURITY FOR END USERS . . . . . . . . . . . . . . . . . . . . . 2

COMPUTER SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

COMPUTER VIRUSES, TROJAN HORSES, AND LOGIC BOMBS. . . . . . . . . . . . . 61

COMPUTER SECURITY IN APPLICATION SOFTWARE . . . . . . . . . . . . . . . . 34

COMPUTER VIRUSES: DETECT, PREVENT, CURE INFECTIONS. . . . . . . . . . . . 69

COMPUTER FRAUD (M2010). . . . . . . . . . . . . . . . . . . . . . . . . . 38

COMPUTER SECURITY EXECUTIVE OVERVIEW. . . . . . . . . . . . . . . . . . . 1

COMPUTER SECURITY SYSTEMS I - CS 229. . . . . . . . . . . . . . . . . . . 58

COMPUTER SECURITY AWARENESS (CBT) . . . . . . . . . . . . . . . . . . . . . 7

COMPUTER SECURITY FOR MANAGERS. . . . . . . . . . . . . . . . . . . . . . 30

COMPUTER VIRUSES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

COMPUTER SECURITY FOR SECURITY & ADP PROGRAM MANAGERS . . . . . . . . . . 17

COMPUTER SECURITY AWARENESS . . . . . . . . . . . . . . . . . . . . . . . . 6

COMPUTER SECURITY & CONTINGENCY PLANNING. . . . . . . . . . . . . . . . . 51

COMPUTER SECURITY FOR MANAGERS SEMINAR. . . . . . . . . . . . . . . . . . 53

COMPUTER SECURITY FOR SECURITY OFFICERS . . . . . . . . . . . . . . . . . 62

COMPUTER SECURITY SYSTEMS II - CS 329 . . . . . . . . . . . . . . . . . . 58

COMSEC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

CONTINUITY OF OPERATIONS/DISASTER RECOVERY PLANNING: PART I . . . . . . . . 8

CONTINUITY OF OPERATIONS/DISASTER RECOVERY PLANNING: PART II
WORKSHOP . . 30

CONTROL AND SECURITY OF LOCAL AREA NETWORKS . . . . . . . . . . . . . . . 52

CONTROL AND SECURITY OF LANS. . . . . . . . . . . . . . . . . . . . . . . 50

DATA CENTER RECOVERY PLANNING (M2040) . . . . . . . . . . . . . . . . . . 20

DATA COMMUNICATIONS SECURITY. . . . . . . . . . . . . . . . . . . . . . . 28

DATA SECURITY PLANNING: STRATEGIES FOR EFFECTIVE INFORMATION
SECURITY
(W9898) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

DATA SECURITY PLANNING. . . . . . . . . . . . . . . . . . . . . . . . . . 68

DATABASE SECURITY SEMINAR . . . . . . . . . . . . . . . . . . . . . . . . 65

DETECTING AND PREVENTING COMPUTER FRAUD . . . . . . . . . . . . . . . . . 11

DEVELOPING COMPUTER SECURITY POLICIES & PROCEDURES. . . . . . . . . . . . 28

DISASTER RECOVERY PLANNING. . . . . . . . . . . . . . . . . . . . . . . . 70

DISASTER RECOVERY PLANNING: STRATEGIES TO DEVELOP & MAINTAIN
PROVABLE
RECOVERY CAPABILITY (W9912) . . . . . . . . . . . . . . . . . . . . . 20

EDI: New Frontiers For Auditors . . . . . . . . . . . . . . . . . . . . . 56

EDP AUDITING - CIS 433. . . . . . . . . . . . . . . . . . . . . . . . . . 78

EDP CONCEPTS FOR BUSINESS . . . . . . . . . . . . . . . . . . . . . . . . 6

EDP AUDITING: THE FIRST STEP. . . . . . . . . . . . . . . . . . . . . . . 52

EXECUTIVE AIS SECURITY BRIEFING . . . . . . . . . . . . . . . . . . . . . . 8

FEDERAL AIS COMPUTER SECURITY REQUIREMENTS. . . . . . . . . . . . . . . . 4

FUNDAMENTALS OF COMPUTER SECURITY FOR FEDERAL INFORMATION
SYSTEMS . . . . 64

HOW TO MANAGE AN INFORMATION SECURITY PROGRAM: A GUIDE FOR NEWLY
APPOINTED MANAGERS. . . . . . . . . . . . . . . . . . . . . . . . . . 23

IMPLEMENTING & MANAGING A COMPUTER SECURITY PROGRAM . . . . . . . . . . . 19

IMPLEMENTING AND TESTING THE DISASTER RECOVERY PLAN . . . . . . . . . . . 88

INFORMATION RISK ASSESSMENT AND SECURITY MANAGEMENT - CSMN 655. . . . .
. 82

INFORMATION POLICY - CS 230 . . . . . . . . . . . . . . . . . . . . . . . 63

INFORMATION SECURITY PRINCIPLES AND PRACTICES . . . . . . . . . . . . . . 17

INFORMATION SYSTEMS AUDIT WORKSHOP. . . . . . . . . . . . . . . . . . . . 49

INFORMATION RISK ASSESSMENT & SECURITY MANAGEMENT . . . . . . . . . . . . 3

INFORMATION SYSTEMS SECURITY (CSI 214). . . . . . . . . . . . . . . . . . 81

INFORMATION SYSTEMS SEMINAR FOR INTERNAL AUDITORS . . . . . . . . . . . . 4

INFORMATION SECURITY AND POLICY . . . . . . . . . . . . . . . . . . . . . 32

INFOSEC FOUNDATIONS SEMINAR . . . . . . . . . . . . . . . . . . . . . . . 54

INFOSEC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

INFOSEC EVALUATIONS USING FORMAL METHODS. . . . . . . . . . . . . . . . . 76

INTEGRATED AUDITING: THE BASICS . . . . . . . . . . . . . . . . . . . . . 42

INTRODUCTION TO COMPUTER SECURITY FOR NON-ADP MANAGERS. . . . . . . . . .
16

INTRODUCTION TO COMPUTER SECURITY FOR FIRST-LEVEL SUPERVISORS . . . . . .
16

INTRODUCTION TO SOFTWARE VERIFICATION . . . . . . . . . . . . . . . . . . 76

INTRODUCTION TO EDP AUDITING (M2022). . . . . . . . . . . . . . . . . . . 37

INTRODUCTION TO LAN SECURITY. . . . . . . . . . . . . . . . . . . . . . . 10

INTRODUCTION TO AUDITING MICROS AND LANS: CONTROLLING END-USER
COMPUTING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

INTRODUCTION TO SECURE SYSTEMS. . . . . . . . . . . . . . . . . . . . . . 34

KEEPING OUT OF TROUBLE WITH THE SOFTWARE POLICE . . . . . . . . . . . . . . 9

LAN SECURITY (M2006). . . . . . . . . . . . . . . . . . . . . . . . . . . 37

LAN SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

LAN TUNING AND PERFORMANCE FOR AUDIT AND SECURITY PERSONNEL . . . . . . .
57

LAN SECURITY OVERVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

LAN SECURITY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

LEGAL ENVIRONMENT OF INFORMATION SYSTEMS - GBA 560. . . . . . . . . . . . 79

MANAGING COMPUTER SECURITY-MERGERSS, ACQISITIONS, AND
DIVESTITURES. . . . 67

MANAGING THE ACQUISITION OF MLS RESOURCES . . . . . . . . . . . . . . . . 14

MANAGING AND DEVELOPING A DISASTER RECOVERY PLAN. . . . . . . . . . . . . 87

MANAGING AN ORGANIZATION-WIDE INFORMATION SECURITY PROGRAM. . . . . . .
. 27

MARKETPLACE IMPLICATIONS OF THE EVOLUTION OF EVALUATION CRITERIA. . .
. . . 7

MICRO SECURITY FOR INFORMATION SYSTEMS SECURITY ANALYSTS. . . . . . . . .
35

MICROCOMPUTER SECURITY. . . . . . . . . . . . . . . . . . . . . . . . . . . 7

MICROCOMPUTER SECURITY. . . . . . . . . . . . . . . . . . . . . . . . . . 62

MODEL INTERPRETATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . 75

NETWORK AUDITING (M2034). . . . . . . . . . . . . . . . . . . . . . . . . 35

NETWORK SECURITY ARCHITECTURE . . . . . . . . . . . . . . . . . . . . . . 74

NETWORK RECOVERY PLANNING (M2056) . . . . . . . . . . . . . . . . . . . . 22

NETWORK SECURITY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

NETWORK SECURITY SEMINAR. . . . . . . . . . . . . . . . . . . . . . . . . 65

NEW FRONTIERS FOR AUDITORS. . . . . . . . . . . . . . . . . . . . . . . . 56

ON-LINE, DISTRIBUTED COMMUNICATIONS SYSTEMS: CONTROL, AUDIT &
SECURITY. . 55

OPERATING SYSTEM SECURITY CONCEPTS. . . . . . . . . . . . . . . . . . . . 72

OPERATIONAL NETWORK SECURITY SEMINAR. . . . . . . . . . . . . . . . . . . 84

PC/LAN RECOVERY PLANNING (M2042). . . . . . . . . . . . . . . . . . . . . 20

PC/LAN AUDITING (M2028) . . . . . . . . . . . . . . . . . . . . . . . . . 36

PC SECURITY (M2004) . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

PC SECURITY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

PC-LAN AND DATA SECURITY. . . . . . . . . . . . . . . . . . . . . . . . . . 9

PHYSICAL SECURITY FOR DATA PROCESSING . . . . . . . . . . . . . . . . . . 31

PLANNING AN EDP DISASTER RECOVERY PROGRAM . . . . . . . . . . . . . . . . 33

PRACTICAL CONSIDERATIONS FOR IMPLEMENTING A MULTILEVEL SECURE
NETWORK . . 15

PRACTICAL ASPECTS OF OWNING A MULTILEVEL SECURE NETWORK . . . . . . . . .
14

PRACTICAL ASPECTS OF PLANNING TO ACQUIRE MULTILEVEL SECURITY IN AN
OPEN
SYSTEMS ENVIRONMENT . . . . . . . . . . . . . . . . . . . . . . . . . 12

PRACTICAL CONSIDERATIONS FOR PLANNING & IMPLEMENTING MULTILEVEL
SECURITY
IN AN OPEN SYSTEMS ENVIRONMENT. . . . . . . . . . . . . . . . . . . . 13

PRACTICAL CONSIDERATIONS FOR PLANNING MULTILEVEL SECURITY IN AN
OPEN
SYSTEMS ENVIRONMENT . . . . . . . . . . . . . . . . . . . . . . . . . 15

PRACTICAL ASPECTS OF ACQUIRING AND OWNING A MULTILEVEL SECURE
NETWORK . . 11

PRACTICAL CONSIDERATIONS FOR ACQUIRING AND IMPLEMENTING A
MULTILEVEL
SECURE NETWORK . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

PROTECTING YOUR NETWORKS FROM HACKERS, VIRUSES, AND OTHER ATTACKS
. . . . 23

PROTECTING NETWORKS & SMALL SYSTEMS . . . . . . . . . . . . . . . . . . . 29

RECENT DEVELOPMENTS IN INFORMATION SECURITY . . . . . . . . . . . . . . . 25

RISK ASSESSMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

RISK ASSESSMENT TECHNIQUES FOR AUDITORS . . . . . . . . . . . . . . . . . 71

RISK MANAGEMENT . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

SECURE SYSTEMS DESIGN AND PROGRAM MANAGEMENT. . . . . . . . . . . . . . . 26

SECURITY AND PRIVACY OF INFORMATION SYSTEMS - GBA 578 . . . . . . . . . . 78

SECURITY TECHNOLOGY IN THE REAL WORLD . . . . . . . . . . . . . . . . . . 45

SECURITY AND CONTROL IN AUTOMATED SYSTEMS-AUDIT IS. . . . . . . . . . . . 63

SECURITY IN SOFTWARE APPLICATIONS . . . . . . . . . . . . . . . . . . . . 33

TELECOMMUNICATIONS SECURITY SYSTEMS - EE 250. . . . . . . . . . . . . . . 59

TELECOMMUNICATIONS FOR INFORMATION SYSTEMS SECURITY ANALYSTS. . . . .
. . 1

TEMPEST PROGRAM MANAGEMENT AND SYSTEMS ENGINEERING. . . . . . . . . . . . 81

THE CMW: USER TUTORIAL. . . . . . . . . . . . . . . . . . . . . . . . . . .90

THE SECURITY-AUDIT ALLIANCE . . . . . . . . . . . . . . . . . . . . . . . 83

THE SYSTEMS INTEGRATOR'S PERSPECTIVE ON AIS SECURITY STRATEGIES . . . . .
8

THE DATA CENTER: AUDITING FOR PROFIT. . . . . . . . . . . . . . . . . . . 56

THE CMW: ADMINISTRATOR TUTORIAL . . . . . . . . . . . . . . . . . . . . . 61

THE CMW: APPLICATION PROGRAMMING. . . . . . . . . . . . . . . . . . . . . 88

THE INTEGRATED AUDIT WORKSHOP . . . . . . . . . . . . . . . . . . . . . . 48

THEORETICAL FOUNDATION/TRUST OF INFORMATION SYSTEMS . . . . . . . . . . . 73

TRUSTED SYSTEMS CRITERIA AND CONCEPTS . . . . . . . . . . . . . . . . . . 72

TRUSTED INTEGRATION/SYSTEM CERTIFICATION. . . . . . . . . . . . . . . . . 71
UNDERSTANDING TRUSTED SYSTEMS . . . . . . . . . . . . . . . . . . . . . . 19

UPS: DESIGN, SELECTION AND SPECIFICATION . . . . . . . . . . . . . . . . 34

USING INVESTIGATIVE SOFTWARE TO DETECT FRAUD. . . . . . . . . . . . . . . 47

WRITING SECURITY PLANS. . . . . . . . . . . . . . . . . . . . . . . . . . 26

LIST OF APPENDICES
A - Major Categories
B - Vendor List
C - Product List
D - Product Specific Courses
E - Training Matrix
COURSE TITLE: Telecommunications for Information Systems Security Analysts
COURSE LENGTH: 32 HRS

VENDOR:
DATAPRO Educational Services
600 Delran Parkway
Delran, NJ 08076
(609) 764-0100

This course provides an introduction of basic telecommunications systems and mediums for the
System
Security analyst and an understanding of the integral role they play in successful protection of the
system's
data. They will learn current regulatory and control concepts, gain a working knowledge of
telecommunications principles and develop an understanding of the products and services offered
from
various vendors. They will also learn proactive techniques that support diverse information
transmission
mediums and develop an understanding of telecommunication systems vulnerabilities. They will
learn how
to evaluate the present contingency plan and how to develop a risk analysis formula. They will
develop
a project plan for contingency implementations of hardware and software that support disaster
recovery.


COURSE TITLE: Computer Security Executive Overview
COURSE LENGTH: 3 HRS.

VENDOR:
MACRO International, Inc.
8850 Stanford Boulevard
Columbia, MD 21045
(410) 290-2800

This briefing is designed for executive personnel and will present an overview of applicable laws
and other
requirements for computer security. The course will emphasize implementation of these
requirements at
the executive management level, and the role of senior management in supporting security
initiatives.

















COURSE TITLE: ADP Security Officers (ADPSO) Concepts
COURSE LENGTH: 8 HRS

VENDOR:
Naval Computer and Telecommunications Station
ATTN Code N823
PO Box 357056
San Diego, CA 92135-7056
(619) 545-8628 - DSN 735-8628

This one-day course is an overview of what is involved in implementing a command AIS Security
Program and discusses the DoD and DON Minimum Program Requirements policy. This course
is
excellent for a beginner ADPSO or other AIS Security staff members. The course outlines the
responsibilities of DON management and command AIS Security Staff members, identifies the
steps
necessary for accreditation, and the structure of the DON AIS Security Program which includes a
discussion on the Controlled Access Protection (CAP) Guidebook (NAVSO P-5239-15). The
course
discusses aids in solving common AIS Security problems and discusses methods in determining
system
security levels. This course is conducted at the NAVCOMTELSTA San Diego facility or at your
command.

COURSE TITLE: Computer Security For End Users
COURSE LENGTH: 1 DAY

VENDOR:
USDA, Graduate School
600 Maryland Ave, SW
Washington, DC 20024
(202) 447-7124

This workshop will give you an overview of the threats to, and vulnerabilities of, computer
systems, and
appropriate safeguards to protect those systems. We will stress your role in the protection of
sensitive
data, and in the prevention and detection of computer crime. You will receive checklists and
suggestions
for becoming more aware of possible computer security problems in your office, and you will be
able to
get advice on how to deal with concerns that are specific to your agency or installation.














COURSE TITLE: Computer Security For Executives
COURSE LENGTH: 3 HRS

VENDOR:
USDA, Graduate School
600 Maryland Ave, SW
Washington, DC 20024
(202) 447-7124

This briefing will give you a basic understanding of computer security. It includes an overview of
threats
and vulnerabilities to computer systems and your responsibility for the assessment of your
agency's
computer security program. We will review briefly the history of computers, then examine
current
dependencies on computers, applicable laws and regulations, computer crime, viruses, and touch
on
espionage. Bring your questions because the briefing is designed to be responsive to your needs.
Time
has been reserved at various points for you to raise concerns from your individual agency
perspective.

COURSE TITLE: Computer Security Awareness Training
COURSE LENGTH: 3 HRS

VENDOR:
GSA Training Center
P.O. Box 15608
Arlington, VA 22215-0608
Joan Bender: (703) 603-3213

Participants learn to be aware of threats to and vulnerabilities of computer systems, as well as to
encourage use of improved security practices. Topics include: Computer Security Act of 1987;
computer
fraud, waste, and abuse; and types of computer hackers. Also discussed are natural disasters and
human
errors relating to computer security.

COURSE TITLE: Information Risk Assessment & Security Management
COURSE LENGTH: 1 SEM

VENDOR:
University of Maryland, University College
University Boulevard at Adelphi Road
College Park, MD 20742-1614
(301) 985-7155

An examination of the proliferation of corporate data bases and the development of
telecommunications
network technology as gateways or invitations to intrusion. Ways of investigating the
management of the
risk and security data and data systems are presented as a function of design through recovery and
protection. Issues of risk and security, as they relate to specific industries and government, are
major
topics in the course. Examples are presented of how major technological advances in computer
and
operating systems have placed data, as tangible corporate assets, at risk. Both quantitative
sampling
techniques for risk assessment and for qualitative decision-making under uncertainty are explored.


COURSE TITLE: Federal AIS Computer Security Requirements
COURSE LENGTH: 1 DAY

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
Ronald E. Freedman: (301) 588-0800

This course begins with a review of the Federal Computer Security framework and an
introduction to the
key players and legislation that has shaped Federal Computer Security policy.

COURSE TITLE: Information Systems Seminar For Internal Auditors
COURSE LENGTH: 5 DAY

VENDOR:
Ernst & Young
2000 National City Center
Cleveland, OH 44114
Morton T. Siegel: (800) 289-5745

This introductory seminar of computer concepts and controls is designed for the MIS or internal
auditing
professional who needs to learn about basic computer concepts, computer controls and security,
system
life cycle planning and control, and contingency planning. Individuals with these backgrounds
who
complete this seminar will be exposed to every major aspect of information systems auditing and
should
be able, with the tools provided in the seminar, to perform basic IS Audits. In addition, the
seminar will
emphasize how ISA is integrated with the internal audit process. This is a five-day, classroom
program
consisting of stand-alone modules that can be presented as a whole or modules can be selected to
provide
training on specific subjects in shorter-duration programs. Call the vendor for more information
regarding
which of the following modules have been selected for this particular training area.
Module 1-Introduction to the Seminar
Module 2-Information Systems Auditor's Role
Module 3-Getting Started
Module 4-Planning the IS Audit
Module 5-Overview of the ISA Function
Module 6-Overview of Computer Operations
Module 7-A Management Approach to Computer Fraud
Module 8-Introduction to General Controls
Module 9-Organization and Administration
Module 10-System Development Life Cycle
Module 11-Change Control and Management
Module 12-Case Study
Module 13-The Time Bomb
Module 14-Access Control
Module 15-Case Study
Module 16-Program Execution
Module 17-Continuity of Operations
Module 18-Outsourcing and Other Alternative Processing
Module 19-Cloak and Data
Module 20-Data Bases
Module 21-Minicomputer Systems-Audit and Control Considerations
Module 22-Microcomputers-Audit and Control Considerations
Module 23-Introduction to Application Control Reviews
Module 24-Input Control Objectives and Procedures
Module 25-Case Study-Input Controls
Module 26-Processing Control Objectives and Procedures
Module 27-Output Control Objectives and Procedures
Module 28-Case Study-Processing and Output Controls
Module 29-Generalized Audit Software and Other CAATs
Module 30-Summary
COURSE TITLE: EDP Concepts For Business
COURSE LENGTH: SELF-PACED

VENDOR:
Ernst & Young
2000 National City Center
Cleveland, OH 44114
Morton T. Siegel: (800) 289-5745

EDP Concepts for Business is an interactive computer-based training (CBT) program. The
student
receives information and is coached based upon the answers to teaching questions. This was
designed to
involve the student, be flexible, and be responsive to the student's needs; this format focuses on
the
student. You need only an IBM PC, XT, AT, or any IBM-compatible microcomputer with at
least 192K
memory. Call the vendor for more information regarding which of the following modules have
been
selected for this particular training area.
Module 1-Computers and Their Components
Module 2-Data and Data Processing
Module 3-Programs and Languages
Module 4-The System Development Life Cycle
Module 5-EDP Personnel
Module 6-Access Control and Security

COURSE TITLE: Computer Security Awareness
COURSE LENGTH: 1 HR

VENDOR:
Booz-Allen & Hamilton Inc.
8283 Greensboro Drive
McLean, VA 22102-3838
(703) 902-5201

The purpose of this course is to provide participants with an awareness of computer security, to
sensitize
them to the need for computer security policies and practices in the workplace, and to motivate
each
individual to practice effective computer security techniques. The instructional content of the
course is
composed of:requirements of computer-security-related laws and circulars; definitions and
examples of
basic computer security terms; the increasing concern to protect computer assets; and basic
computer
practices, controls, and countermeasures. NOTE:Contact the vendor for information concerning
specialized
agency training.











COURSE TITLE: Microcomputer Security
COURSE LENGTH: 2 HRS

VENDOR:
Booz-Allen & Hamilton Inc.
8283 Greensboro Drive
McLean, VA 22102-3838
(703) 902-5201

The purpose of this microcomputer security course is to sensitize participants to the need for
microcomputer security and to provide each individual with some practical tools to protect their
microcomputer assets, especially the stored information. The course provides practical
information on
computer security that microcomputer users can implement immediately. NOTE:Contact the
vendor for
information concerning specialized agency training.

COURSE TITLE: Computer Security Awareness (CBT)
COURSE LENGTH: 5-8 HRS

VENDOR:
DPEC
1679 Old Henderson Road
Columbus, OH 43220-3644
(800) 223-3732

This is a Computer Based Training (CBT) course using the framework of administrative, physical
and
logical security. Computer Security Awareness explains contingency planning and precautions
against
computer crime from the viewpoint of mainframe computers and micros; a computer security
checklist
is included. This is a modular course lasting 5 - 8 hours. The number of hours is based upon a
student
interacting with approximately 60-120 screens per hour.

COURSE TITLE: Marketplace Implications of the Evolution of Evaluation Criteria
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy
(410) 859-0123

This seminar covers the current state of the Evolution of Trusted Computer Product Evaluation
schemes,
of North America and Europe, the products which are evaluated and the conclusions which can be
drawn.
The discussions will concentrate on the US Federal Criteria and the implications of the proposed
Common
Criteria, for the marketplace in general, and for the integration of COTS products specifically.
The
briefing is designed to be responsive to your needs, and time is reserved for in-depth discussions
of issues
which affect you most critically.


COURSE TITLE: The Systems Integrator's Perspective on AIS Security Strategies
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

This course presents the application of system integration and composition concepts to the
management
and acquisition of AIS, especially where sensitive data is concerned. A major portion of the
seminar
concentrates on determining the security implications of alternative approaches and involvement
of the
appropriate players during the acquisition process. Managers responsible for the acquisition of
sensitive
computing resources will benefit from this seminar.

COURSE TITLE: Continuity of Operations/Disaster Recovery Planning: Part I
COURSE LENGTH: 1 DAY

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
Ronald E. Freedman: (301) 588-0800

This course outlines the steps to be performed to determine backup/recovery requirements, and
effectively
plan and develop a COOP/DRP for both applications and installations.

COURSE TITLE: Executive AIS Security Briefing
COURSE LENGTH: 1/2 DAY

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
Ronald E. Freedman: (301) 588-0800

This course provides a brief overview of Federal Computer Security requirements and objectives
and
explores Senior Managements role in protecting assets.











COURSE TITLE: Keeping Out of Trouble with the Software Police
COURSE LENGTH: 1 DAY

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2356
Sharon G. Friedman: (508) 872-7990

The common practice of copying and sharing is no longer being tolerated by software publishers.
Organized under the umbrellas of the Software Publishers Association (SPA), they are waging an
all-out
war against abusers of copyright law. In this special, one-day session, you will learn how to keep
your
organization "software legal." Without a lot of confusing "legalese," you will learn: what you
need to
know about software license and copyright laws; the methods being used to enforce software
licenses and
to prosecute copyright infringement; how to recognize potential violations in your organization;
and step-
by-step guidelines for establishing and implementing a practical code of software ethics.

COURSE TITLE: LAN Security Overview
COURSE LENGTH: 16 HRS

VENDOR:
DATAPRO Educational Services
600 Delran Parkway
Delran, NJ 08076
(609) 764-0100

This course will provide the Systems Security analyst with a basic understanding of the security
implications of the Local Area Networks and familiarize the students with the functional
considerations
of LAN security routines. The class format will provide a controlled forum for the analyst to
discuss the
various security routines and procedures currently in use by the government, their establishment
and
design. there will also be discussions on the various types of security measures integrate into the
Network
Operating Systems of Novell, Banyan, SCO UNIX and Starian.

COURSE TITLE: PC-LAN and Data Security
COURSE LENGTH: 40 HRS

VENDOR:
DATAPRO Educational Services
600 Delran Parkway
Delran, NJ 08076
(609) 764-0100

This course is intended to give a perspective of the various types of security threats to the first
and second
level managers of the Telecom and MIS departments. It has a broad scope, however, it provides
a good
foundation for future courses to focus on individual issues and develop security plans.




COURSE TITLE: Advanced Technology Conference
COURSE LENGTH: 3 DAYS

VENDOR:
The Institute of
Internal Auditors
249 Maitland Avenue
Altamonte Springs, FL 32701
(407) 830-7600 ext. 1

The Institute of Internal Auditors' annual Advanced Technology Conference presents
world-renowned
technology experts who will share the solutions, tools, and techniques needed to validate and
enhance job
performance.

This interactive program addresses a variety of technology challenges that auditors face.
Attendees are
provided the opportunity to stay on top of emerging trends as well as the knowledge to utilize the
tools
and techniques available for auditing today's technology.

Security professionals will find the sessions informative from the standpoint of learning the
business
concerns, risks, and related control techniques involved in current and emerging technology.
Participants have the opportunity to:
~ Discuss the newest advances in audit technology.
~ Hear the most informed and experienced speakers.
~ Understand cutting-edge emerging technologies.

The conference provides a forum in which to learn and exchange information on all aspects of
audit,
control, and security technologies.


COURSE TITLE: Introduction to LAN Security
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
(508) 872-7999

Protecting increasingly sensitive LANs is now the most critical security issue facing today's
enterprise.
In this intensive, three-day seminar you will benefit from and experience-based, real-world
approach to
LAN security. You will gain an understanding of basic LAN technology and security threats.
You will
learn the specific components that ensure a solid LAN security program and how security should
be
designed into the system. You will leave this high-impact session prepared to plan and implement
effective and responsive LAN




COURSE TITLE: Detecting and Preventing Computer Fraud
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7990

As the gap between computer technology and computer security widens, IS and Internal Auditors
are
relied upon more than ever to ensure the integrity and security of organizational data. In this
high-impact
seminar you will focus on the risks and threats inherent in computer environments and the
controls that
are necessary to assure management that exposures are held to acceptable levels. Through case
studies
and "real-life" exercises, you will explore areas of computer fraud, risk management, and treats.
You will
leave this three-day seminar knowing the controls for preventing computer fraud and methods for
detecting
it, should it occur.

COURSE TITLE: Practical Aspects of Acquiring and Owning a Multilevel Secure Network
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the course: Give managers and Technical personnel the tools to make appropriate
acquisition and operating decisions regarding MLS Information Systems. Following custom
modules:

Module A. The Technology with MLS added. Mandatory Access Control labels, Exploring
operational
impacts of MLS: MAC vs DAC - vulnerabilities New audit considerations - impact of MLS and
MAC
on the makeup and sensitivity of the Audit Trail data.

Module B. The Environment with MLS added. Impact of an MLS accreditation on configuration
management. Hardware, ancillary equipment, software, especially upgrading to new functionality.
Maintaining accreditation - documentation for the Life cycle A checklist of warning signs for the
Admin/Security staff Addressing security violations (vulnerabilities) in the MLS environment.
How to
use the CERT to best advantage.

Module C. Acquisition of Trusted Systems. A seminar for local procurement initiators,
managers, and
procurement technicians to review the appropriate usage of language in an RFP for Trusted
Systems, or
MLS Network components. This seminar discusses specification language for the SOW, how to
use
CDRLs for acquiring Assurance documentation, and pitfalls to avoid in preparation of the
procurement
plan.




COURSE TITLE: Practical Considerations for Acquiring and Implementing a MultiLevel
Secure
Network
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the Course: Give managers and technical personnel the tools to select acquire and
implement cost effective security technologies in information systems.

Module A. Sorting out the technologies defined by NCSC
A discussion of the subtleties of the "Rainbow" books

Module B. Overview of the State-of-the-Art
A Look beyond the Hype at the marketplace of Trusted Systems

Module C. Acquisition of Trusted Systems: A seminar for local procurement initiators,
managers, and procurement technicians to review the appropriate usage of language
in an
RFP for Trusted Systems, or MLS Network components.

COURSE TITLE: Practical Aspects of Planning to Acquire Multilevel Security in an Open
Systems
Environment
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the Course: Give managers and technical executives the tools to plan and acquire
cost
effective technologies for ensuring the enforcement of their security policies in information
systems.Custom modules include:

Module A. Organizational Responsibilities
DoD Security Policy Refresher. complying with DoD Inst 5200.28

Module B. Understanding which Technology is for which Problem
(Getting there -from here)

Module C. Acquisition of Trusted Systems

A seminar for local procurement initiators, managers, and procurement technicians to review the
appropriate usage of language in an RFP for Trusted Systems.


COURSE TITLE: Practical Considerations for Planning and Implementing Multilevel

Security in an Open Systems Environment
COURSE LENGTH: 16 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the Course: Give technical executives the tools to plan and select cost effective
technologies
and to make cost-effective Operational decisions regarding the enforcement of their security
policies in
MLS Information Systems. This course is a tailored set of modules customized from among:
Organizational Responsibilities [2 hrs]
Sorting out the technologies defined by NCSC [4 hrs]
Overview of the State-of-the-Art [2 hrs]
Understanding which Technology is for which Problem
(Getting there -from here) [3 hrs]
The Technology with MLS added [3 hrs]
The Environment with MLS added [2 hrs]

COURSE TITLE: Case Studies in Multilevel Secure Networking
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the course: Give on-site managers and Technical personnel tools based on specific
local
cases, to make cost-effective Operational decisions regarding migration to MLS Information
Systems. This
briefing will cover: The Customer Environment with MLS Added, Identifying your accreditor,
Reviewing
requirements for Internal Review Audits, Coordinating with the CM/QA team on-site, Tracing the
flow
of ADP Security Reporting Reviewing specific responsibilities and requirements for co-location
of
CRYPTO or other NSA approved/controlled items, Exploring which state-of-the-art systems
might meet
specific local requirements, while being within the range of our resources. Sampler of Evaluated
Operating
Systems, Workstations, Networking Components and Specialty Components. Specific
information about
levels of expertise required to implement a system on-site with them.









COURSE TITLE: Managing the Acquisition of MLS Resources
COURSE LENGTH: 4 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the course: Give on-site managers and Technical personnel tools to make
cost-effective
procurement decisions regarding migration to MLS Information Systems. Specific topic
discussed:
Acquisition of Trusted Systems: A seminar for local procurement initiators, managers, and
procurement
technicians to review the appropriate usage of language in an RFP for Trusted Systems, or MLS
Network
components. This seminar discusses specification language for the SOW, how to use CDRLs for
acquiring
Assurance documentation, and pitfalls to avoid in preparation of the procurement plan. You will
also
receive a copy of the NSA and NIST Acquisition guidance for trusted systems.

COURSE TITLE: Practical Aspects of Owning a Multilevel Secure Network
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the course: Give managers and Technical personnel the tools to make cost-effective
Operational decisions regarding MLS Information Systems. Course Curriculum consists of: The
Technology with MLS added The Information Systems equivalents to Markings, Caveats,
handling
instructions - Mandatory Access Control labels Exploring operational impacts of MLS: MAC vs
DAC-
vulnerabilities New audit considerations - impact of MLS and MAC on the makeup and sensitivity
of the
Audit Trail data. Tracking an atomic action through several audit trails. Enhancing the security
profile
of an MLS system Impact of an MLS accreditation on Configuration Management A checklist of
warning
signs for the Admin/Security staff Addressing security violations How to use the CERT to best
advantage
Impact of having a CRYPTO in the closet. You will receive checklists and suggestions for
operating
sensitive systems daily.












COURSE TITLE: Practical Considerations for Implementing a MultiLevel Secure
Network
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy: (410) 859-0123

Objectives of the Course: Give managers and technical personnel the tools to select and use cost
effective
security technologies in information systems. Specific topics: technologies defined by NCSC The
TCSEC
"Orange Book", The TNI "Red Book": MIAD components, The TDI "Purple Book": TCB
subsets, The
CSSI "Powder Blue Book": components which support the security policy in a more restrained
fashion,
The ISSPSC: there's more in there than the EPL. The definitive catalog of NSA evaluated
technology.
A Look beyond the Hype at the marketplace of Trusted Systems IBM's MVS/ESA RACF (B1),
CA's B1
Security Amdahl's Trusted MDF, Unisys OS-1100 (B1)Workstations CMWs Networks and
components
Xerox XEU, LEAD, Motorola NES, Blacker A sampler of specialty components (subsystems)
Making an
informed decision to use non-evaluated product and the cost of getting smart enough to be able to
evaluate
it yourself.

COURSE TITLE: Practical Considerations for Planning Multilevel Security in an Open
Systems
Environment
COURSE LENGTH: 8 HRS

VENDOR:
Grumman Data Systems & Services
839 Elkridge Landing Rd. Suite 106
Linthicum, MD 21090
Bruce Levy (410) 859-0123

Objectives of the Course: Give managers and technical executives the tools to plan and select
cost
effective technologies for planning the enforcement of their security policies in information
systems.
Specific topics: Organizational Responsibilities DoD Security Policy Refresher, Complying with
DoD Inst
5200.28, Accreditation Requirements, What Certification means, How Evaluation helps,
Documentation
of your system (network), Cost effective steps toward MLS, Avoiding common password
headaches, Some
Practical approaches to all that Audit trail. You will get expert advice on what works and what
your
installation needs to enter the distributed age of computing.











COURSE TITLE: Introduction to Computer Security for First-Level Supervisors
COURSE LENGTH: 8 HRS.

VENDOR:
MACRO International, Inc.
8850 Stanford Boulevard
Columbia, MD 21045
(410) 290-2800

This program is designed for first-level supervisors and emphasizes the role of the supervisor in
implementing and managing computer security programs. The course discusses approaches for
instilling
security awareness in staff, training, security administration, and incident management and
reporting. An
overview of threats, protection strategies, and implementation of policies and procedures is
presented,
emphasizing requirements for different levels of system sensitivity.

COURSE TITLE: Introduction to Computer Security for Non-ADP Managers
COURSE LENGTH: 8 HRS.

VENDOR:
MACRO International, Inc.
8850 Stanford Boulevard
Columbia, MD 21045
(410) 290-2800

This program is designed to provide mid-level managers with an overview of computer security
program planning and management. Presentation will emphasize compliance with P.L. 100-235
and
other laws and requirements for classified and unclassified systems. Discussion will also
emphasize
the threat against sensitive systems; capabilities of potential adversaries; asset value; sensitivity
and
definition of protection levels appropriate to the threat; contingency planning; and management
risk
acceptance. The course will also cover the development of security plans emphasizing human
resource
management practices, the implementation of computer security programs within budget and staff
constraints.
















COURSE TITLE: Computer Security for Security & ADP Program Managers
COURSE LENGTH: 3 DAYS

VENDOR:
MACRO International, Inc.
8850 Stanford Boulevard
Columbia, MD 21045
(410) 290-2800

This course is designed for ADP program managers and computer security program managers. It
provides an overview of Public Law 100-235 and other laws and requirements for computer
security.
Discussion will emphasize various types of threats against sensitive systems; capabilities of
potential
adversaries; areas of vulnerability; and control techniques.

This course provides a comprehensive understanding of the full range of potential threat and the
effectiveness of alternative security controls against different threats. This course is oriented
toward
those with prior programming and systems development experience.

COURSE TITLE: Information Security Principles and Practices
COURSE LENGTH: 4.5 DAYS

VENDOR:
George Mason University
Department of Information & Software Systems Engineering
School of Information Technology and Engineering
Fairfax, VA 22030-4444
Ravi Sandhu: (703) 993-1659

This course introduces fundamental issues and concepts of information security, emphasizing the
Trusted computer System Evaluation Criteria (TCSEC), which is the seminal publication
providing
authoritative guidance concerning trust technology; and its eventual successor, the Federal
Criteria for
Information Technology Security. Security policy, risk management, certification and
accreditation are
discussed in their supporting roles. The threat of viruses and other rogue programs is discussed; a
case study reinforces the lessons learned. Practical advice for trusted system integration is
provided.














COURSE TITLE: COMPUSEC
COURSE LENGTH: 2 DAYS

VENDOR:
Security Engineering Services, Inc.
5005 Bayside Road
Chesapeake Beach, MD 20732
Bruce Gabrielson: (301) 855-4565

This class is an unclassified overview of COMPUSEC requirements, issues and related COMSEC
and
TEMPEST information. Attendees should be able to intelligently address technical vulnerability
issues
in their ADP systems.

Topics Covered
Laws and DoD Specifications, Trusted Computer Systems, Risk Management, Configuration
Management, Data Remnance, Software Disk Protection, Virus Protection, Network Overviews,
COMSEC Protection,
TEMPEST Protection, OPSEC Issues
Student Background: Intended for entry level security people.

COURSE TITLE: Basics of Computer Security
COURSE LENGTH: 2 DAYS

VENDOR:
Thomas R. Hardy & Associates, Inc.
P.O. Box 5631
Derwood, Maryland 20855
(301) 921-0595

This course is designed for end users and management personnel - it presents the elements
necessary
for developing a secure computer system environment. The class addresses the needs of small
and
large systems, and network configuration. Topics include: Planning and design; Threats and
Vulnerabilities; Countermeasures; Contingency planning and disaster recovery; Backup site
planning;
Responsibilities.















COURSE TITLE: Understanding Trusted Systems
COURSE LENGTH: 1 DAY

VENDOR:
BoozAllen & Hamilton
8th Floor, Room 822
8283 Greensboro Drive
McLean, VA 22102-3838
Butch Chaboudy: (703) 902-5265

This course provides an understanding of the Trusted System Evaluation Criteria (Orange Book)
and
the Trusted Network Criteria and Trusted Database Management interpretation. The student will
gain
a working knowledge of the security fundamentals, the features of each class and the assurance
required of these features. Additionally, the student will be introduced to other appropriate
rainbow
series books.

COURSE TITLE: Implementing & Managing a Computer Security Program
COURSE LENGTH: 1 DAY

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
(301) 588-5922

This course provides an overview of a computer security program, and describes the requirements
and
rationale for each program element.

COURSE TITLE: Risk Assessment
COURSE LENGTH: 1 DAY

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
(301) 588-5922

This course provides a global examination of computer security risk assessment and the
techniques for
applying risk assessment.









COURSE TITLE: Disaster Recovery Planning: Strategies to Develop and Maintain
Provable
Recovery Capability (W9912)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACH (800) 426-8322

This course teaches you how to develop, maintain, and test your disaster recovery plan. The
objective
is to develop provable recovery capability, not paper documentation. The focus is on what the
organization - I/S and the business functions - must put in place now, keep current and test to the
satisfaction of responsible executives that the business can survive the loss of processing
capability. The
course discusses strategies that are independent of any particular hardware or software
implementation.
This is a management course, not a technical course.

COURSE TITLE: Data Center Recovery Planning (M2040)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACH (800) 426-8322

This course provides you with a basic understanding of the disaster recovery planning process
within a
data center environment. The course focuses on the recovery of the data center and
communications
to and from business units/departments. All phases of the recovery planning process, from
disaster
declaration through relocation to a new facility, are discussed

COURSE TITLE: PC/LAN Recovery Planning (M2042)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACH (800) 426-8322

This course provides you with a basic understanding of the disaster recovery planning process
encompassing personal computers (PCs) and local area networks (LANs). The course focuses on
the
recovery of stand-alone PCs, LANs (the file server environment), and LAN communications to
and
from business units/departments. All phases of the recovery planning process, from disaster
declaration through relocation to a new facility, are discussed.



COURSE TITLE: Business Impact Analysis (M2044)
COURSE LENGTH: 2 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACH (800) 426-8322

This course teaches you how to perform a risk analysis to ascertain the impact that a disaster may
have on your business. You will also learn how to analyze your important business functions and
the
consequences, if lost, to the organization. You will learn the time period after which this loss
becomes critical and the priorities that each important business function has within the overall
recovery
process. You'll learn to use a process involving a thorough impact analysis focusing on all aspects
of
the business, not just computerized processes. The course enables you to build an impact analysis
and
better understand your overall business process.

COURSE TITLE: Business Resumption Planning (M2046)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACH (800) 426-8322

This course teaches you the many facets of preparing a Business Resumption Plan (BRP). To be
able
to resume normal business operations within an organization after a serious outage, an effective
recovery plan must be in place. This course focuses on the business reasoning of such a plan and
identifies some of the obstacles that will have to be overcome. Having a Business Resumption
Plan in
place may prevent unnecessary loss to your organization if a disaster affects your manual or
automated
business functions. The course shows how to build an effective BRP for your organization. Full
attention will be given to the different aspects of the plan, auditors who must review the
competency
of an organization's recovery plans.














COURSE TITLE: Network Recovery Planning (M2056)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACH (800) 426-8322

This course teaches you the fundamentals of handling adverse conditions on networks and
recovering
functionality even after complete shutdown or network failure. Different data exchange protocols
and
their benefits and vulnerabilities are presented along with the use of servers, routers, and
gateways.
Typical local area networks (LANs) and wide area networks (WANs) that mix topologies are also
examined. Particular attention is given to preventing the network failure or shutdown, and to
minimizing its effect.

COURSE TITLE: Data Security Planning: Strategies for Effective Information Security
(W9898)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACH (800) 426-8322

This course teaches you how to plan and implement data security. It is based upon and uses
examples
from successful programs. It takes an organizational view of information and presents many
policies,
standards and guidelines of IBM and other organizations. The course discusses strategies that are
independent of any particular hardware or software implementation. This is a management
course, not
a technical course. The course discusses programs and processes within the context of end-user
computing and shows how they can enhance protection.
















COURSE TITLE: Protecting Your Networks from Hackers, Viruses, and Other Attacks
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
ramingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7999

Hackers, phone phreaks, viruses, corporate spies, and disgruntled employees are all real threats to
today's organizations. In this three-day technical seminar you will examine the nature of these
significant security threats and vulnerabilities. You will learn practical, cost-effective security and
audit techniques that will dramatically improve your success in reducing risk while enabling you to
go
systematically monitor your organization's security strengths and weakness. You will leave this
high-
tech session with sample checklists, a set of valuable software tools, and "how-to" reference
materials
that will increase your effectiveness and decrease of attacks on your network.

COURSE TITLE: How to Manage an Information Security Program A Guide for Newly
Appointed Managers
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7999

This three-day session will be your guide to establishing and managing a workable information
security program. You will learn the components of a comprehensive plan, covering access
control
software applications; telecom/network security measures; physical protection of the computer
facility;
and the legal and regularity aspects of information security. You will learn how to protect your
organization from computer crime and viruses. You will explore disaster recovery and the key
elements of an effective business continuity program. You will leave this session with a blueprint
for
building an information security program or for measuring an existing one.














COURSE TITLE: Audit and Security of Client/Server Architectures
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7999

As more critical applications continue to move onto networks, the open architecture concept, a
lack of
true separation of duties, poor administration, and often unfamiliar network tools leave
organizations
open to risk. In this timely seminar you will review the basics of client/server architectures,
uncover
the risks within the technology, and identify cost-effective controls for plugging these loopholes.
You
will learn how to spot poorly designed client/server applications and how to identify connection
risks.
You will explore communications protocols, distributed databases, and the most commonly used
network operation systems, including NetWare, VINES, Unix, NT and OS/2. You will leave this
in-
depth seminar with a checklist that you can use as a foundation for a customized workplan for
your
own client/server audits.

COURSE TITLE: A Fraud Update: Forensic and Investigative Auditing
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7999

As incidents of fraud continue rise, management now more than ever looks to Audit as its first
line of
defense against this bottom-line busting crime. Using case studies and interactive exercises, this
three-
day seminar will be your road map through the major fraud concerns facing organizations today.
You
will cover investigative principles, forensic auditing, rules of evidence, and federal fraud statue
and
sentencing guidelines. You will learn how to develop evidence to support fraud allegations and
what
the responsibilities of the audit committee are when fraud is discovered. This high-impact session
will
provide you with a solid understanding of contemporary fraud issues and Audit's role in
protecting the
organization from this pervasive and complicated crime.












COURSE TITLE: Risk Management
COURSE LENGTH: 24 HRS

VENDOR:
Naval Computer and Telecommunications Station
ATTN Code N823
PO Box 357056
San Diego, CA 92135-7056
(619) 545-8628 - DSN 735-8628

This three-day course is a comprehensive study of Risk Management and is given in a workshop
type
environment. This course will provide the attendee with a definition of what comprises Risk
Management and will explain the different components of Risk Management. Instruction will
consist
of discussion on Risk Analysis, Contingency Planning, and Security Test and Evaluation (ST&E).
Attendees will have a thorough understanding of each of these Risk Management phases and how
to
prepare them. Course will provide the attendee with actual hands-on exercises for each of these
phases. Risk Analysis instruction will include preparation of a Risk Analysis using the three
different
methods. Also the Risk Analysis portion will include principles for performing a Risk Analysis on
a
Local Area Network (LAN). Strongly recommend completion of the ADPSO Concepts course
before
taking this course. This course is conducted at the NAVCOMTELSTA San Diego facility or at
your
command.

COURSE TITLE: Recent Developments in Information Security
COURSE LENGTH: 4.5 DAYS

VENDOR:
George Mason University
Department of Information & Software Systems Engineering
School of Information Technology and Engineering
Fairfax, VA 22030-4444
Ravi Sandhu: (703) 993-1659

This intensive course presents a comprehensive approach to recent developments in Information
Technology (IT) security. Technology and policy issues for secure operations employing both
Computer Security (COMPUSEC) and Communications Security (COMSEC) components of
Information Security (INFOSEC) are presented. Contemporary issues addressed include:
encryption,
key escrow, and key management for authentication, integrity, and confidentiality; proposed
standards
such as Digital Signature and Clipper; challenges in developing international criteria; database
issues
such as polyinstantiation, inference, and aggregation; and access control beyond the TCSEC
(Orange
Book).

Discussions will include the use of empirical and theoretical computer and database system and
network design approachers. Broader issues will also be presented, such as integrating security
with
computer, database, and network systems design and development requirements; and evaluating
the
degree of security available for a given computer, database and/or network system. Extensive
practical
advice for trusted system integration is provided.


COURSE TITLE: Secure Systems Design and Program Management
COURSE LENGTH: 2 DAYS

VENDOR:
Security Engineering Services, Inc.
5005 Bayside Road
Chesapeake Beach, MD 20732
Bruce Gabrielson: (301) 855-4565

Participants learn technical rational and requirements that lead to formal management decision
making
regarding security issues. Topics Covered: Org. Security, Systems Security Engineering
Management,
Risk Management, Audit Controls, Contingency Planning, Risk Analysis, System Test and
Evaluation,
System Design, Network Administration, UNIX, Apple System 7, Config. Management, Life
Cycle
Management, Virus Protection, COMSEC, Control, TEMPEST Control and Vulnerability
Assessments

COURSE TITLE: Writing Security Plans
COURSE LENGTH: 2 DAYS

VENDOR:
BoozAllen & Hamilton
8th Floor, Room 822
8283 Greensboro Drive
McLean, VA 22102-3838
Butch Chaboudy: (703) 902-5265

This course is designed to provide the System Security Officer with the knowledge to develop an
ADP
security plan that will meet the requirements to PL 100-235 and D/CID 1/16. Practical exercises
are
provided allowing students to develop key sections of a security plan as part of a work group.
Each
exercise is conducted following appropriate instruction in "how to" write the plan. Upon
completion
of the course, the student will know what information is needed in the development of a security
plan,
what the plan should include, where that information can be obtained and how to write policy
statements and security requirements.

















COURSE TITLE: Managing Org-Wide Information Security Program
COURSE LENGTH: 3 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

This program examines key issues in building and maintaining a security program that serves more
than one division...a program that cuts across traditional boundaries and must deal with
geographically
and organizationally distinct units. Practical, cost-effective ideas on how to structure a plan, tools
for
evaluating risks and safeguards, and ways to encourage participation and commitment from all
levels
of the organization. Legislative and regulatory pressures including but not limited to the Foreign
Corrupt Practices Act, copyright protection, and the Computer Security Act of 1987. Take-home
materials include articles, checklists, forms, and information sources. NOTE: Ask about available
discount for government hosted classes.

COURSE TITLE: Building Information Security Awareness
COURSE LENGTH: 2 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

This seminar shows how to "educate" managers, users, and DP personnel on the importance of
protecting information resources. Top managers need to know in macro, bottom-line terms. Data
security professionals need detailed technical training. Computer users, operators, and
programmers
must be shown what they can do on a day-to-day operational basis. This program delivers
practical
ideas and techniques on how to tailor a computer security training/orientation program to each of
these
diverse groups. You will learn how to plan a program. You will be shown what types of
information
should be gathered for presentation, how it should be logically organized for maximum impact,
and
which meeting and presentation techniques are most effective. And finally, you will be given
specific
ideas on how to measure the effectiveness of your security awareness program. As a
"deliverable," you
will develop an individualized training plan to be used in your own environment. NOTE: Ask
about
available discount for government hosted classes.










COURSE TITLE: Data Communications Security
COURSE LENGTH: 2.5 DAYS

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
(301) 588-5922

This course provides an overview of network processing technologies, security threats,
safeguards, and
protection strategies. The data communications environments covered in this course include
Local
Area Networks, Wide Area Networks, Distributed Data Processing, and remote mainframe
access.

COURSE TITLE: Developing Computer Security Policies & Procedures
COURSE LENGTH: 2 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

This seminar is for DP managers, data security managers, and security officers responsible for
developing computer security policies and procedures and integrating them into a comprehensive
data
processing security manual. You will learn how to determine what policies are needed, what
areas a
manual should cover, and how to gather the necessary information. Two different approaches -
step-by-step "cookbook" procedures vs. more generalized policy statements. How to establish
working
liaisons with support staff in other areas, what's needed to get your policies and manual reviewed
and
approved, and pitfalls that must be avoided. Critique actual samples of procedures and policies
currently in use. NOTE: Ask about available discount for government hosted classes.

COURSE TITLE: LAN Security
COURSE LENGTH: 2 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

Local area networks (LANs) are significantly impacting the way organizations do business. As
more
and more critical work migrates from mainframes to LANs, the need for better controls becomes
apparent. Learn about the security and control issues involved with LANs; the types of critical
and
sensitive data now residing on LANs; the impact of loss, change or disclosure; and realistic
remedies
for identified vulnerabilities. How transition technologies, topologies, and architectures create
complex
security, recovery, and integrity problems. Security features of popular LAN systems software
and
add-on packages. The need for policies, procedures, and administrative controls. NOTE: Ask
about
available discount for government hosted classes.

COURSE TITLE: Protecting Networks & Small Systems
COURSE LENGTH: 3 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

Widespread use of microcomputers and telecommunications technology offers greater
opportunities for
increasing white-collar productivity...and the risk that this technology will proliferate out of
control.
This seminar provides a security and control perspective of the opportunities and pitfalls in this
new
environment. It will be valuable for data processing management, communications management
and
specialists, office automation management, EDP auditors, security officers, and users of small
systems.
Participants are encouraged to bring a list of specific, relevant security problems currently being
faced
within their own organizations. Selected "cases" will be analyzed and discussed. NOTE: Ask
about
available discount for government hosted classes.
































COURSE TITLE: Application Security Reviews
COURSE LENGTH: 1 DAY

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
(301) 588-5922

This course examines the requirements and objectives of application security and describes the
techniques and tools for conducting application security reviews. The course includes the
planning
process, review of the baseline security goals, sensitivity and criticality determination, data
collection
methods, and control weaknesses and safeguards determination.

COURSE TITLE: Computer Security For Managers
COURSE LENGTH: 1 DAY

VENDOR:
USDA, Graduate School
600 Maryland Ave, SW
Washington, DC 20024
(202) 447-7124

This workshop will show you how to develop computer security awareness for end-users, and
your
role in program management, planning, personnel security, contingency planning, and the systems
development life cycle. We will briefly review the Computer Security Act of 1987, and cover
threats
to, and vulnerabilities of, computer systems and appropriate safeguards, and various approaches
to risk
assessment. You will receive checklists and suggestions for becoming more aware of possible
computer security problems in your office, and you will be able to get advice on how to deal with
concerns that are specific to your agency or installation.

COURSE TITLE: Continuity of Operations/Disaster Rec. Planning: Part II Workshop
COURSE LENGTH: 3 DAYS

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
Ronald E. Freedman: (301) 588-0800

This course will be specifically tailored toward the individual course audiences' environment. To
accomplish this, research questionnaires must be completed by course participants prior to
attending.
These questionnaires will provide the baseline hardware, software, physical, and operational
environments critical to the development of a discreet COOP/DRP.




COURSE TITLE: Physical Security for Data Processing
COURSE LENGTH: 2 DAYS

VENDOR:
COMSIS
8737 Colesville Road, Suite 1100
Silver Spring, MD 20910
(301) 588-5922

This course provides essential training to personnel in the areas of physical and environmental
security
in both large scale (mainframes) and small scale (PC) processing environments.

COURSE TITLE: Audit, Control, and Security of LAN and Mainframe Connectivity
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7999

In this fast-paced, three seminar you will focus on the control, security, and management aspects
that
should be included in any LAN evaluation. After a general overview of a LAN environment, you
will
review the Open Systems and OSI "standardized" models of any computing/communication
system and
develop a layered audit/analysis work plan based on the models. With this work plan as a guide,
you
will investigate: LAN topologies; protocols; LAN interconnections to wide area networks
(WANs);
client-server and peer-to-peer LAN architectures; LAB Network Operating Systems; connecting
LANs
to mainframes; and many more related topics. Keeping jargon and technology in its proper
perspective, emphasis will be placed on those aspects of LAN operation with the greatest audit
and
security concerns. A basic understanding of the fundamentals of microcomputers and PC-based
applications such as spreadsheets and database management is strongly recommended.

COURSE TITLE: Computer Viruses
COURSE LENGTH: 3 HRS

VENDOR:
USDA Graduate School
600 Maryland Ave., S.W.
Washington, D.C. 20024
(202) 447-7124

This briefing is designed to provide you with a basic understanding of the nature of computer
viruses
and suggested methods and procedures for identifying and dealing with them. The material will
focus
primarily on the microcomputer based environment but network and mini-computer virus issues
will
be discussed as well.




COURSE TITLE: Computer Security
COURSE LENGTH: 5 DAY

VENDOR:
GSA Training Center
P.O. Box 15608
Arlington, VA 22215-0608
Joan Bender: (703) 603-3213

Participants learn about federal computer security regulations and guidelines and their
implementation
in government agencies. Topics include: a threat overview, national computer security policies, an
overview of the National Institute of Standards and Technology and the National Computer
Security
Center, physical security considerations, microcomputer security considerations, introduction to
risk
assessment, qualitative risk assessment, quantitative risk assessment, other risk assessment
methodologies, contingency planning, design reviews and system tests, and security certification
and
accreditation.

COURSE TITLE: Information Security and Policy
COURSE LENGTH: 1 SEMESTER

VENDOR:
George Washington University/GSAS
2000 G Street, NW
Washington, DC 20077-2685
(202) 994-7061

Computer fraud and effective countermeasures for computer system security. The social and
legal
environment of information systems, including data privacy and ethics in database management.
Information access policy, data security, contracts. Antitrust and other business implications of
policies, transborder data flow, technology transfer, electronic funds transfer systems, criminal
justice
information systems, cross-cultural differences, computer infringement of copyright, and
protection or
property rights in software. Prerequisite: AdSc 202 and 203.
















COURSE TITLE: Planning an EDP Disaster Recovery Program
COURSE LENGTH: 3 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

This seminar examines the critical components of the disaster recovery planning process in detail
and
offers a practical framework for implementing a disaster recovery program. A "big think"
approach is
required, because recovery planning is tedious, time-consuming, and requires management
commitment
plus cooperation from all levels of user personnel. Less than 20% of the top 1,000 U.S. firms
have
workable EDP disaster recovery plans that have been successfully tested. Indeed, many
organizations
today have no formal plans at all. Some have tried to formulate a plan but failed because they
underestimated the scope and complexity of the task. Although a 3-day seminar cannot provide
all the
details necessary for a comprehensive program, this seminar will give you a firm grounding in the
knowledge and skills needed for a successful disaster recovery planning effort. NOTE: Ask about
available discount for government hosted classes.

COURSE TITLE: Security in Software Applications
COURSE LENGTH: 3 HRS

VENDOR:
USDA Graduate School
600 Maryland Ave., S.W.
Washington, D.C. 20024
(202) 447-7124

This briefing is designed to provide participants with a basic understanding of features and
techniques for
incorporating computer security into the design and development of software applications. The
material
covered explores a variety of computer security design and programming techniques to enable
programmers and system designers to build security into their applications.















COURSE TITLE: Introduction to Secure Systems
COURSE LENGTH: 2 DAYS

VENDOR:
BoozAllen & Hamilton
8th Floor, Room 822
8283 Greensboro Drive
McLean, VA 22102-3838
Butch Chaboudy: (703) 902-5265

This class provides the student with an understanding of the basic principles to follow in the
development
and operation of secure systems--that is, systems that we can trust to protect sensitive or
classified
information. This course provides the fundamentals of determining security requirements for
trusted
systems, determination of mode of operation, calculation of the level of trusted needed for a
system, and
an understanding of the collective impact of security features on a system.

COURSE TITLE: UPS: Design, Selection and Specification
COURSE LENGTH: 2 DAY

VENDOR:
University of Wisconsin, Milwaukee
929 North 6th Street
Milwaukee, WI 53203
(800) 222-3623

Program objectives of this institute will have been accomplished if, upon completion, the attendee
can
answer satisfactorily the following questions: Where is UPS needed? When is UPS needed?
Should the
system be redundant? How should components be chosen? How is a system designed? What
level of
protection is appropriate? What are the system maintenance requirements? What grounding and
noise
problems need consideration? How can satisfactory performance be achieved while satisfying the
NEC?
NOTE:Previous attendees will find that material has been added to the program since they last
attended.

COURSE TITLE: Computer Security In Application Software
COURSE LENGTH: 2 DAY

VENDOR:
Booz-Allen & Hamilton Inc.
8283 Greensboro Drive
McLean, VA 22102-3838
(703) 902-5201

This course presents a logical sequence of overall computer security activities during the
application
development life cycle. The course will assist application developers, sponsors, and owners in
identifying
security activities that should be considered for applications, whether they are being developed,
significantly enhanced, or routinely debugged. This course is primarily intended for application
software
managers and support personnel. NOTE:Contact the vendor for information concerning
specialized agency
training.


COURSE TITLE: Computer Security
COURSE LENGTH: 1 SEM

VENDOR:
Montgomery College
51 Mannakee Street
Rockville, MD 20850
(301) 279-5185

This course surveys major topics in assessment and development of security procedures for a
variety of
computer system. Emphasis is on analysis of security needs, risk assessment and practical
measures for
security management. topics include LAN security, protection for personal computers, physical
security,
hardware and software protection and products, virus countermeasures and the human aspects of
computer
security.

COURSE TITLE: Micro Security for Information Systems Security Analysts
COURSE LENGTH: 32 HRS

VENDOR:
DATAPRO Educational Services
600 Delran Parkway
Delran, NJ 08076
(609) 764-0100

Security Analysts and functional Security coordinators will develop basic microcomputer security
skills
and understand the integral role they play in successful protection of system-wide data.
Participants will
learn various methods for proper disk handling and secure storage, determine proper data backup
techniques and learn techniques for controlling access to data hardware and software. They will
learn how
to evaluate the present contingency plan and develop a risk analysis formula and also will develop
a
project plan for contingency implementations of hardware and software.


COURSE TITLE: Network Auditing (M2034)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches you the fundamentals of performing a security audit on a computer network.
The
course will begin with a review of positive and negative aspects of today's most commonly used
networks.
The security facts and assumptions of each network topology are explored in lecture and
classroom
exercises. This examination of networks includes all elements of network security (the node, the
media,
and the control unit). Different data exchange protocols and their benefits and vulnerabilities are
examined
along with the use of servers, routers, and gateways. Typical local area networks (LANs) and
wide area
networks (WANs) that mix several topologies are also examined for their vulnerabilities.

COURSE TITLE: PC/LAN Auditing (M2028)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches you how to review the security controls in a PC/LAN environment. You will
explore
the hardware and software components that impact the protection of the PC/LAN environment.
You will
learn the types of information needed to assess the strength of implemented controls as well as
how to
perform the collection of this information. Examples are presented that allow you to gain
experience in
interpreting security related data.

COURSE TITLE: Auditing the Data Center (M2020)
COURSE LENGTH: 2.5 Days

VENDOR:

Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches you how to develop a data center audit for environmental, operational, and
procedural
issues and how to prepare for such an audit. You will learn how to locate potential problems
within your
data center that could result in significant losses. This course focuses not only on the
technological issues
but on the business issues as well. You will learn how to report the findings to management with
words
that will get their attention. The classroom exercises will illustrate 200+ questions that can be
utilized
within the audit process and that will help you in preparing a data center checklist specifically for
your
environment.

















COURSE TITLE: Introduction to EDP Auditing (M2022)
COURSE LENGTH: 3 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches you the fundamentals of auditing electronic data processing (EDP)
information
systems. Reviewing the integrity and security of the business information processed by computers
and
their applications requires specialized skills. This course provides the initial education for those
skills by
presenting an audit approach to computerized information systems. You will learn about some of
the tools
and techniques necessary to audit a computerized environment. The focus is on the computing
center,
distributed processing, application development, operating systems, and the applications
themselves.
Classroom exercises will show you how to identify the important elements of these systems and
how to
write effective audit reports.

COURSE TITLE: PC Security (M2004)
COURSE LENGTH: 1 day

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches you the fundamentals involved in providing effective and comprehensive
protection
of personal computers and the information they contain. You will learn how to examine the
various
components of PCs and to identify problems that can impact the protection of the PC assets.
Typical
threats to and concerns about the data residing on PCs will be discussed. Guidance on
countermeasures
for implementing effective controls will also be given.
















COURSE TITLE: LAN Security (M2006)
COURSE LENGTH: 1.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches you the basics of how and where to implement effective controls in a local
area
network (LAN). Security pitfalls existing in both the hardware and software components that
make up
a LAN will be identified. The significant challenges presented by the fast growth of LANs in the
workplace will be met head on with guidelines for reducing security exposures. Although this
course does
not address the specific implementations of any single network operating system (LAN Network
Manager,
NetWare, Banyan, etc.), the topics discussed apply to any and all of these.

COURSE TITLE: Business Fraud (M2008)
COURSE LENGTH: 2 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches you about some of the most common frauds and criminal activities that your
organization could fall prey to. You will learn how to recognize and detect them before your
business
is exploited. You will learn which tools to use to review your organization for on-going
fraudulent
activities and what to do when they are detected. Crimes against business, such as industrial
espionage,
telemarketing crimes, computer crimes, and employee crimes, are a part of U.S. business today.
This
course will help you to understand their symptoms, their effects, and the methods to reduce their
impact.
Classroom exercises illustrate ways to detect some of them and to avoid becoming their next
victim.

COURSE TITLE: Computer Fraud (M2010)
COURSE LENGTH: 2.5 Days

VENDOR:
Skill Dynamics - An IBM Company
One IBM Plaza, 19th Floor
Chicago, IL 60611
(800) IBM-TEACh (800) 426-8322

This course teaches how to detect and prevent the use of the computer for fraudulent activities.
The ease
of use that computers have provided to business has created an ease of use for the perpetrator of
computer
fraud. You will learn how to recognize the signs of unauthorized computer activity. You will be
taught
the basic ways that your organization can fall prey to these activities and the ways to prevent or
minimize
the threat. The crimes discussed will range from actual programming issues to manipulation of
computer
for fraudulent goals.

COURSE TITLE: Audit and Control of Electronic Data Interchange
COURSE LENGTH: 2.5 DAYS

VENDOR:
The Institute of
Internal Auditors
249 Maitland Avenue
Altamonte Springs, FL 32701
(407) 830-7600 ext. 1

This seminar explains clearly the risks and exposures that can result from opening the
organization's
computer platform to additional users - both internal and external to the organization. This
course covers
the basics of Electronic Data Interchange (EDI) and stresses internal controls that should be
implemented
to protect the organization's assets.

Attendees will learn:
~ EDI concepts and terminology.
~ The benefits and risks of EDI.
~ Internal control requirements for internal and external users.
~ The basics of telecommunications and third party value-added networks.

Participants will perform a self-assessment of their organization's internal controls regarding EDI
and will
develop an audit program throughout the course. An appendix will include a risk, control, and
audit step
matrix, a generic audit program, current readings, and a glossary.
























COURSE TITLE: Audit and Control of End-user Computing (EUC)
COURSE LENGTH: 2.5 DAYS

VENDOR:
The Institute of
Internal Auditors
249 Maitland Avenue
Altamonte Springs, FL 32701
(407) 830-7600 ext. 1

Audit and Control of End-user Computing focuses on the auditor's role in reviewing controls
surrounding
end-user developed applications. Attendees learn:
~ EUC concepts and terminology.
~ The benefits, risks, and exposures of EUC applications.
~ EUC controls.
~ How organizations should administer EUC applications.
~ What to include in the organization's EUC policy.

During this hands-on seminar, participants will use an IBM/Novell local area network (LAN) for
class
exercises. LANSchool is used by the instructor for display of the class discussion material. Other
packages demonstrated or used include Lotus 123, Lotus FreeLance, Clear Software's ALLClear
(flowcharting package), Audit Command Language's ACL for networks, Software Publishers
Association's
SPAudit, and WordPerfect.

Participants are provided the SAC Toolkit End-user Audit Program, Module 7 of the SAC report
End-user
and Departmental Computing, sample EUC policies and responsibilities, a glossary of terms, and a
sample
EUC survey document.





















COURSE TITLE: Auditing Information Systems
COURSE LENGTH: 4.5 DAYS

VENDOR:
The Institute of
Internal Auditors
249 Maitland Avenue
Altamonte Springs, FL 32701
(407) 830-7600 ext. 1

This course explains the functions and controls required to safeguard assets in a computer
processing
environment. It focuses on the auditor's role in reviewing systems management and those general
or
environmental controls that affect applications operating within a given organization or network.

Key topics include:
~ The challenging issues and functions of information system units.
~ Internal audit's role in information system reviews.
~ Management information systems (MIS) standards.
~ Understanding data security and program change management.
~ Exploring system development life cycle concepts.
~ Understanding data bases, data processing standards, and processing support.
~ Disaster-recovery planning procedures.
~ Operating systems, distributed systems, and end-user computing.
~ Understanding network security and administration.

Sample audit programs, a glossary, and a bibliography of course-related reading materials provide
an
excellent starting point for attendees preparing to audit information systems.






















COURSE TITLE: Integrated Auditing: The Basics
COURSE LENGTH: 4.5 DAYS

VENDOR:
The Institute of
Internal Auditors
249 Maitland Avenue
Altamonte Springs, FL 32701
(407) 830-7600 ext. 1

This seminar offers the know-how to perform applications reviews in the computerized arena.
The course
teaches basic EDP auditing skills and knowledge, and defines the "integrated auditor". The
seminar
includes a comprehensive case study of a total audit. Participants are provided a sample audit
program,
a glossary of terms, sample computer policies, and a sample user security manual.

Attendees learn:
~ The basics of computer controls, both within and around applications.
~ An approach to audit planning including
- risk analysis.
- identifying risks and exposures.
- development of test objectives.
- evaluation of results of auditing.
- reporting to management.
~ Minimal computer programming standards.
~ Tools and techniques needed to perform a review of modern automated applications,
including
stand-alone applications and fully integrated mainframe applications.

Integrated Auditing: The Basics is tailored to auditors just entering the EDP audit arena, including
auditors
in departments moving toward integration and financial/operational auditors performing functional
audits
involving automated applications.



















COURSE TITLE: Computer Security for Security and MIS Professionals
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7999

The very technologies that have streamlined today's organizations have created vast opportunities
for
computer crime and misuse. With PCs on virtually every desktop and networks to link one
workstation
to another, computer-savvy criminals and disgruntled employees have more ingenious ways to
gain access
to critical data and confidential information. This plan-English seminar is an eye-opener that will
be your
road map through a maze of high-tech, high risk exposures. You will discover how to plug the
security
loopholes in computer systems, networks, E-mail, voice-mail, and fax transmissions that leave
your
organization vulnerable to attack. The seminar covers: strategies for establishing polices and
procedures
that will keep costly abuse to a minimum; employee security awareness techniques; sensitive legal
issues
surrounding employee privacy rights and software copyright infringement; and more. You will
leave this
seminar with valuable guidelines and real-world models for preventing, detecting, and responding
to
criminal attacks, virus infections, and accidental errors in your own organization.

COURSE TITLE: Intro. to Auditing Micros and LANs: Controlling End-User Computing
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
(508) 872-7999

LANs and microcomputers have placed the tools for processing and storing data directly on the
decks of
end users. In this three-day seminar you will learn the fundamentals of microcomputer and LAN
technology, and how to classify the risks microcomputer and end-user computing have introduced
into the
organization. You will examine the control techniques currently available to address these risks
and how
to conduct an audit using a detailed audit program you can bring back for use in your own
organization.













COURSE TITLE: Basic Security For PC Users
COURSE LENGTH: 8 HRS

VENDOR:
Naval Computer and Telecommunications Station
ATTN Code N823
PO Box 357056
San Diego, CA 92135-7056
(619) 545-8628 - DSN 735-8628

This one-day course provides the attendees with a basic understanding of the AIS Security
Program
fundamentals. This course satisfies the awareness training requirements prescribed in the Public
Law 100-
235 which mandates that all users of computers must have awareness training. Course training
focuses
on ways to eliminate or control potential problems in a microcomputer and Local Area Network
(LAN)
environment. This course discusses the DON policy and Minimum Program Requirements that
must be
met to comply with policy mandates. The attendees will be given techniques to enhance their
awareness
of vulnerabilities in a microcomputer and LAN operating environment and the appropriate
protective
measures available to reduce operating risks. This course is conducted at the NAVCOMTELSTA
San
Diego facility or at your command.

COURSE TITLE: INFOSEC
COURSE LENGTH:

VENDOR:
Security Engineering Services, Inc.
5005 Bayside Road
Chesapeake Beach, MD 20732
Bruce Gabrielson: (301) 855-4565

This course presents a comprehensive overview of information security (INFOSEC) focusing on
network
ADP security and other technical issues seldom covered in general introductory level courses.
DoD
requirements for government (NSA-NCCS, Air Force, MC, Navy, Joint Staff) and defense
industry (DIS)
are discussed. Related OPSEC issues are presented.

Attendees should leave this course with a full understanding of the technically based INFOSEC
security
issues.












COURSE TITLE: Security Technology in the Real World
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723
SEMINAR OUTLINE

A. THE NEW SECURITY IMPERATIVE :* Why technology security is on everyone's mind *
Our
growing dependence on computers and communications * The range of threats: Some "horror
stories"-
Internal: - Error and omissions - Disgruntled employees - Natural disasters External: - Hackers -
Competitors - Viruses and Worms.
B. COMPUTER SECURITY RESEARCH:* Hot Topics: computer science point of view
-Cryptography
- Identification - Distributed Database Security * Hot topics: business point of view - Security
awareness
in industry - Level of security planning - Future plans protection.
C. WORKSHOP - IDENTIFYING KEY ISSUES FOR SEMINAR PARTICIPATION:
*Introduction
* Worktime * Presentations.
D. GROUP DEBRIEFING ON WORKSHOP PROBLEMS OF IMPORTANCE

E. A METHODOLOGY FOR STRATEGIC RISK MANAGEMENT - ORGANIZATION
MODELLING * Functional model * Situation assessment * Situation simulation * Strategic
systems
planning and integration * Data classification Exercise: Data classification questionnaire *
Implementation
of Data classification - Mainframe - Unix environment.
F. UNIX SYSTEM SECURITY CONSIDERATIONS * Unix history with respect to security *
Access
protection - owner, group, public - files and directories - listing file access (1s-1) - changing file
access
(chmod) * Common Unix security problems - Password cracking - Getting root access -
Superuser abuse
- Spoofing - Intelligent terminal problems * Unix network problems - Anonymous ftp -
Competitors -
Remote logins - Worm programs.
G. WORKSHOP - SECURING FILES IN UNIX:* Background * Command writing exercise.
H. PHYSICAL SECURITY: * Access control * Fire protection * Flood/water damage * Theft
protection
* Off site backup.
I. INSURANCE ASPECTS OF TECHNOLOGY: * Loss of assets * Loss of data * Loss of
confidentiality * Valuable papers * Business interruption * Software escrow.
J. LOGICAL ACCESS SECURITY :* Defining user IDs * Privilege fields * ID registration.
K. LEGAL ASPECTS OF T SECURITY: * What makes a "computer crime"? * Criminal Codes -
Unauthorized use of computer - Mischief against data * Civil remedies * Copyright infringement
* Theft
* Fraud * Trade secrecy provisions * Working with law enforcement personnel.

L. WORKSHOP: DEALING WITH A VIRUS THREAT:* Problem description * Worktime *
Presentation of solutions.
M. COMMUNICATIONS SECURITY: * Wiretapping, low and high tech * Local area networks
*
Cellular telephones * Fax modems * Voice mail systems.
N. RCMP EDP SECURITY: Bulletin #33 (reproduced with permission).
O. CONTINGENCY PLANNING :* Focus on corporate business issues * Proactive aspects *
Reactive
aspects * Risk management issues * Key issues.
P. FOCUS ON ISSUES RAISED BY PARTICIPANTS: * Defining the problem * Seeking a
solution
- at what cost?
Q. CREATING A SECURITY PLAN FOR YOUR ORGANIZATION:* Elements of a good
security
plan * Who should do it * How to implement it * The need for regular review and testing.
R. CONTROLS IN A MICROCOMPUTER ENVIRONMENT: * Introduction * The acquisition
process * Installation and maintenance * Inventory control * Troubleshooting * Application
development
* Training * Documentation * File back-up and data security
* Computer Viruses * Hardware Security * Input/Output and Processing Controls
* Application Dependency Model.
S. FUTURE TRENDS IN COMPUTER SECURITY

T. CONCLUDING REMARKS
COURSE TITLE: Using Investigative Software to Detect Fraud
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

This seminar is designed to teach the concepts of investigative software and provide participants
with the
skills required to design, develop and install investigative software routines upon completion of
the course
material. Each participant will receive a compendium of suggested investigative software routines
for
specific industries and applications.

COURSE TITLE: Auditing System Development: New Techniques for New Technologies
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

This seminar focuses on the effect new technologies have on the audit approach and explores
methods to
ensure that the audit requirement is met without slowing the project or becoming a drain on
project
resources. Special emphasis is placed on early identification of control requirements and the rapid
reporting techniques that are required in today's dynamic system development environment.

COURSE TITLE: Auditing EDI Applications
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

This seminar will provide you with an understanding of EDI and provide you with the skills and
techniques required to audit in this complex environment. Each participant will receive suggested
audit
programs and checklists, to assist in performing application audits in and EDI environment.









COURSE TITLE: The Integrated Audit Workshop
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

This workshop is designed for auditors who will be using the integrated audit approach. It
explains both
manual and computerized controls and provides a complete audit approach for auditing modern
applications. At the end of the workshop, participants will be able to identify and evaluate the
controls
in a computerized application through the use of control matrices. This workshop can be
modified for
in-house presentation to the entire audit department.

COURSE TITLE: Audit Software for the 21st Century
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

In the past audit software has been the domain of the I.S. auditor. Recent technology
breakthroughs now
provide each internal and external auditor with software capability that is easy to use and
increases audit
coverage. In preparing for the 21st century all audit departments require strategies to automate
audits,
perform silent and remote audits and improve audit productivity. This seminar explores existing
technologies and provides participants with the knowledge to acquire, create and implement the
software
tools that will form the basis of the audit philosophy of the 21st century.

The open system concept has traditionally created a software dilemma for auditors in that
computer
assisted audit techniques had to be rewritten for each mainframe and minicomputer. Now PC
based
products enable auditors to circumvent this situation to create software once for multiple platform
execution. This capability not only provides significant economies of scale by reducing software
development costs, but it also enables greater consistency in audit software tests while maximizing
auditor
productivity. The availability of pc compatible tape drives and high capacity hard disks provide
large file
processing capability so that mainframe applications can now be readily audited using the PC.

In addition to learning new techniques, participants will be provided with a free authorized
demonstration
copy of ACL, the industry standard PC product for audit software. Participants will then be able
to
reinforce what they learned in the seminar with examples they can code and test when they return
to the
office so that they can demonstrate the 21st century audit concept to their management.






COURSE TITLE: Information Systems Audit Workshop
COURSE LENGTH: 4 DAYS

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

This 4 day workshop is designed for auditors who will be conducting audits in a computerized
environment. It assumes no prior knowledge of EDP audit concepts or procedures and provides
participants with a sound understanding of the audit risks relating to information systems. Once
the
groundwork is laid, participants will learn the controls required in computerized applications and
a step
by step approach to effectively evaluate the EDP control structures. As their understanding
increases,
participants progress to more complicated IS audit topics including local area networks, data
security,
telecommunications networks and operating systems. Participants will receive the skills, audit
programs
and checklists required for them to perform information systems audits on their return to the
office.

COURSE TITLE: Auditing Client/Server Technology
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

Client/Server technology is rapidly becoming the preferred processing methodology for both large
and
small organizations. Larger organizations are looking to client/server technology to replace
traditional
large scale mainframes. Management is looking to client/server technology to provide
productivity
improvement, empower employees and to provide better service levels at a reduced cost. As
with any
new technology, the shift to a client/server environment poses many risks to the business and the
business
control structure. This seminar will provide participants with a sound knowledge of client/server
technology and the control mechanisms required to ensure a safe and secure processing
environment.














COURSE TITLE: Control and Security of LANS
COURSE LENGTH: 3 DAY

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

As local area networks (LAN's) permeate the organization, security and control issues are often
ignored.
This seminar takes a hard look at the audit concerns of LAN's and how to install effective controls
in this
dynamic computer environment. Participants will learn what can go wrong in the LAN
environment and
what preventive and detective controls are available to mitigate control weaknesses within the
LAN or
from external connections. LAN Management and the role of the LAN officer is discussed in
detail.
Special emphasis is placed on management of the hardware and connectivity along with the
selection of
software. These key items often limit the overall usefulness of the LAN and inhibit the
achievement of
connectivity and productivity objectives. Each participant will receive detailed audit programs,
common
control weaknesses and sample recommendations. These are the key tools they need to conduct
LAN
audits.

COURSE TITLE: Auditing Datacomm Networks
COURSE LENGTH: 3 DAY

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

Wide area networks are the lifeblood of corporate information processing and connectivity, yet
many
organizations have yet to do a complete audit of network operations and management. This
seminar
provides the IS auditor with a structured audit approach directed to identifying critical control
weaknesses
in the network, the carriers, the media and network management. Proven solutions to common
control
weaknesses will be provided to each participant. Focus in this seminar is on a complete audit
approach
for data and voice communications from a security and cost perspective. Network management
tools and
problem resolution techniques are the cornerstone of network operations. Special emphasis is
placed on
using NETVIEW, a popular network management tool to identify network problems.
Participants in this
session will receive detailed audit programs and checklists which will provide a strong starting
point for
their first Network Audit.









COURSE TITLE: Computer Security & Contingency Planning
COURSE LENGTH: 3 DAY

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

Security Administration is now a reality in many organizations. Other companies that do not
currently
have a security administration function are considering, or are in the process of creating the
security
function. This seminar is designed to remove the mystery surrounding data security, and to
provide
participants with a proven approach to securing their computer systems. At the end of the
session,
participants will understand security administration and the critical items that must be included to
enable
the function to perform effectively. They will be able to classify data by criticality and
confidentiality.
They will have an understanding of logical access security, disaster contingency planning, and
how to
develop and implement security procedures in their organization.

COURSE TITLE: Auditing Advanced Information Technology
COURSE LENGTH: 3 DAY

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

When Canaudit set out to rewrite the popular ADVANCED EDP AUDITING seminar, the
objective was
to make it the most comprehensive Information Systems audit course currently available in the
public
marketplace. Only a completely new seminar, AUDITING ADVANCED INFORMATION
TECHNOLOGY, could incorporate all of the enhancements. AUDITING ADVANCED
INFORMATION
TECHNOLOGY provides the Information Systems Auditor with the skills required to perform
audits of
Operating Systems, Local Area Networks, Wide Area Networks, Access Security and DB2. In
addition
to generic audit programs, participants will receive detailed product specific checklists for MVS,
Tandem
VAX, AS/400 and Novell. These checklists will enable the IS auditor to conduct audits of those
critical
components of information technology necessary to ensure their organization's information
processing is
secure, controlled and effective. Emphasis is placed on improving the quality of management
techniques
and controls to enable organizations to operate effectively in today's complex information
technology
environment.









COURSE TITLE: EDP Auditing: The First Step
COURSE LENGTH: 3 DAY

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

This seminar provides financial auditors or new information systems auditors with the skills
required to
audit complex automated applications. Detailed coverage of computerized controls is provided to
ensure
participants understand the key controls and how to audit them. They will also learn how to audit
the data
center, data security, systems under development and how to design audit software tests. In
addition, we
have included a special section on EDI which explains the concepts, the economics and key
controls
available to ensure electronic transactions are processed accurately and efficiently. A special
section on
Auditing Trading Partner Agreements is devoted to minimizing the negative impact of EDI and
protecting
your organization. Each participant will receive detailed checklists and comprehensive audit
programs so
they can perform Information Systems audits. The audit experiences related by the instructors
provides
valuable insight on how to locate, identify and rectify control weaknesses in a computerized
environment.

COURSE TITLE: Control and Security of Local Area Networks
COURSE LENGTH:

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

As local area networks (LAN's) permeate the organization, security and control issues are often
ignored.
This seminar takes a hard look at the audit concerns of LAN's and how to install effective controls
in this
dynamic computer environment. Participants will learn what can go wrong in the LAN
environment and
what preventive and detective controls are available to mitigate control weaknesses within the
LAN or
from external connections.

LAN Management and the role of the LAN officer is discussed in detail. Special emphasis is
placed on
management of the hardware and connectivity along with the selection of software. These key
items often
limit the overall usefulness of the LAN and inhibit the achievement of connectivity and
productivity
objectives. Each participant will receive detailed audit programs and checklists, common control
weaknesses and sample recommendations. These are the key tools they need to conduct LAN
audits. A
special module has been created that provides a specific control approach for the Novell Netware
and
another module for Unix.






COURSE TITLE: Computer Security for Managers Seminar
COURSE LENGTH: 1 Day

VENDOR:
ARCA
Commerce Center
10320 Little Patuxent Parkway
Suite 1005
Columbia, MD 21044
(410) 715-0500

This session will introduce computer security concepts and management activities and policies for
a
successful security program. Individuals will learn the life-cycle approach for protecting systems
and how
to create effective policy. Other topics include threat and risk analysis, developing and
implementing
incident handling procedures, legal issues, and how to establish and maintain cost effective
programs.

COURSE TITLE: Becoming An Effective Data Security Officer
COURSE LENGTH: 3 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

As a Data Security Officer, you may be responsible for creating a data security program or
administering and improving one already in place. To a great extent, you will be defining your
own role as you proceed. But where do you begin? What skills do you need to do the job?
Where do you get the information to enhance your own skills? Who are the "key players" within
your organization, and how do you get them committed to making security happen? What are the
advantages of the job? The disadvantages? How have others succeeded, and what pitfalls should
you avoid? This practical 3-day program will deliver the know-how to help you become a more
effective, proficient, and successful Data Security Officer. NOTE: Ask about available discount
for government hosted classes.












COURSE TITLE: Auditing Fraud: Prevent, Detect, & Control
COURSE LENGTH: 3 DAY

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701
(508) 879-7999

Internal auditors are relied upon more and more to recognize the characteristics of potentially
fraudulent activities, and to be knowledgeable about where fraud is most likely to occur in the
organization. This intensive seminar examines where and why all types of fraud occur, including
white collar crime, computer fraud, insider fraud, and external fraud. In this session you will
learn to recognize red flag areas of fraud and strategies for reducing it. This seminar is your
short cut to learning how to incorporate prevention, detection, and prosecution of fraud into your
annual audit plans.

COURSE TITLE: INFOSEC Foundations Seminar
COURSE LENGTH: 2 DAYS

VENDOR:
ARCA
Commerce Center
10320 Little Patuxent Parkway
Suite 1005
Columbia, MD 21044
(410) 715-0500

This foundations seminar focuses on system security fundamentals. Individual sessions review
TCSEC requirements, the NCSC~s evaluation process, RAMP, environment guidelines, policy
fundamentals, assurance, trusted application development concerns, and secure system integration
issues. Other sessions describe efforts to develop international standards for trust, introduce the
products on the Evaluated Products List, highlight the concept of risk management, overview
database and network security concerns, and discuss the perils and pitfalls of secure system
integration.









COURSE TITLE: On-Line, Dist Comm Sys:Control, Audit & Security
COURSE LENGTH: 3 DAY

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701
(508) 879-7999

In this seminar you will learn the basic concepts of computer communications systems and a
simple audit/analysis technique which can help you expose risks with very little in-depth
knowledge of the technology. Through examination of the major functions and audit/security
concerns in each layer of the ISO "Reference Model," you will learn the components of a more
in-depth communications audit and the design and evaluation criteria of internal security controls.
The sample work plans you receive, and the guidelines, audit tools, and techniques you learn will
be immediately useful in auditing any communications system.

COURSE TITLE: Advanced Data Comm Networks: Security/Auditability
COURSE LENGTH: 3 DAY

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701
(508) 879-7999

This seminar builds on the tools and techniques learned in On-Line and Distributed
Communications Systems: Control, Audit, and Security, providing a comprehensive study of the
data network portions of a computer communications system-OSI layers 1-4. You will explore,
in-depth, the audit and security concerns in each layer, and examine the design and evaluation
criteria of internal security controls. At the end of this intensive session, you will understand
how protocols, public and private communication systems, and local area networks function. You
will know how to perform a data communications audit. Participants should first attend "On-Line
and Distributed Communications Systems." Participants are invited to bring network maps,
protocol lists, and data traffic load statistics from their own installation.









COURSE TITLE: The Data Center: Auditing For Profit
COURSE LENGTH: 2 DAY

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

The audit programs provided in this course are specifically designed to enable the participants
to conduct the data center audit with little or no need for additional support. Throughout this
session emphasis is placed on ensuring that appropriate preventive controls are in place to prevent
unscheduled interruption of processing or inappropriate data access. Disaster contingency
planning is discussed in depth, with each participant receiving a copy of our general disaster
recovery program. Canaudit has also added a module on out-sourcing which provides auditors
with a good understanding of the concepts and the related risks. As with all Canaudit courses,
this seminar makes extensive use of examples and classroom discussion to supplement the
lecture.

COURSE TITLE: EDI: New Frontiers For Auditors
COURSE LENGTH: 1 DAY

VENDOR:
Canaudit Inc.
P.O. Box 4150
Simi Valley, CA 93093
(805) 583-3723

Electronic Data Interchange is emerging as a major component of many financial, retail and
manufacturing applications. Several major companies have made a public commitment to full
EDI implementation in the near future. this technology presents the auditor with many new
control and security issues in auditing EDI applications. The elimination of physical transactions
and paper audit trails will force each financial auditor to perform functions formerly done by the
EDP Auditor. This session is designed specifically for those auditors who require a
comprehensive audit approach. Modules presented in this seminar include an overview of EDI
technology and standards, critical functions of EDI, the controls available in the X12 standard
and how to implement them. Each participant will receive a comprehensive audit program as
part of the seminar handout.






COURSE TITLE: LAN Tuning and Performance for Audit and Security Personnel
COURSE LENGTH: 2 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701-2357
Sharon G. Friedman: (508) 872-7990

This comprehensive, two-day seminar attacks LAN vulnerabilities head-on and provides you with
the know-how to analyze LAN activity to determine if sensitive network traffics is secured and
if the network is performing at an effective service level. Working with diagnostic tools for both
Ethernet and token-ring networks, you will learn how to read and manage network traffic. You
will discover how to use 100 dynamic network tests to verify that your LANs are meeting your
organization's objectives ins secured manner. This session will provide immediately useable
network monitoring techniques that are applicable for any diagnostic or network management tool
you are currently running. You will leave this high-payback session with the know-how to spot
network problems before they become end-user problems. Attendees should have some
familiarity with LANS.

COURSE TITLE: Audit and Security of Relational Databases and Applications
COURSE LENGTH: 3 DAYS

VENDOR:
MIS Training Institute
498 Concord Street
Framinghan, MA 01701-2357
Sharon G. Friedman: (508) 872-7990

Relational technology has become the industry standard. Today an organization may run several
database systems. Auditors may need to know the specifics of three different relational
databases. This three-day course was designed so you could come to one place and learn what
you will examine and compare the features, audit and security strengths, and accounting log
capabilities of 14 leading relational database systems: DB2, Oracle, Paradox, Sybase, SQL
Server, Informix, Interbase, dBase, Rdb, NetWare, SQL, IDMS, Foxbase, and AS/400. You will
learn the new risks of relational technology, and the associated controls built into each of these
specific systems. In addition, you'll review third-party security software products. You will
leave this power-packed session with useable programs for audition your systems environment,
and the design, development, and operation of a typical application within each specific
environment.




COURSE TITLE: CS 229 - Computer Security Systems I
COURSE LENGTH:

VENDOR:
The George Washington University
Department of Electrical Engineering & Computer Science
Professor Lance Hoffman
Washington, DC 20052
(202) 994-4955

Techniques for security in computer systems. Authentication, logging, authorization, encryption.
Effects of operating systems and machine architecture, countermeasures, risk-analysis systems.
Companion course to EE 250. Prerequisite: CSci 144 (Concepts of Programming Languages) or
equivalent.

COURSE TITLE: CS 329 - Computer Security Systems II
COURSE LENGTH:

VENDOR:
The George Washington University
Department of Electrical Engineering & Computer Science
Washington, DC 20052
Professor Lance Hoffman: (202) 994-4955

Advanced topics in information systems security. Intrusion detection in expert systems related
to computer security. Viruses. Efficacy of anti-viral techniques under various architectures.
Advanced risk analysis methodologies, the developing standard computer security methodology,
and its relationship to other computer security models such as those of Bell and LaPadula, Biba,
and Clark and Wilson. Issues in computer network security. Advanced protection methods
against statistical inference. Prerequisite: CS 229 or permission of instructor.














COURSE TITLE: EE 250 - Telecommunications Security Systems
COURSE LENGTH:

VENDOR:
The George Washington University
Department of Electrical Engineering & Computer Science
Washington, DC 20052
Professor Lance Hoffman: (202) 994-4955

Cryptography. Speech and data scrambling. Nonlinear transformations. Block and stream
ciphers. DES algorithm and public key cryptography. Key management, digital signatures, and
authentication. Data communication security protocols. Secure voice communications. The
CLIPPER initiative and escrowed-key schemes. Companion course to CS 229. Prerequisite EE
204 (Stochastic signals and noise) or equivalent.































COURSE TITLE: AIS Security Strategies
COURSE LENGTH: 8 DAYS

VENDOR:
Information Resources Management College
National Defense University
Ft. Lesley J. McNair
Washington, DC 20319-6000
(202) 287-9321

This course is designed to provide the knowledge necessary for designers, developers reviewers
and approvers of new and updated Automated Information Systems to make sound decisions
about the security aspects of the system. In particular, the primary audience is managers who
are responsible for system design and specification, program management, oversight, certification
and/or accreditation of Automated Information Systems. The secondary audience for the course
includes staff from other disciplines, including technical staff personnel working in such areas
as system security, contracting, inspections or auditing, as well as members of the functional
community. The course does lean towards Department of Defense (DoD)-level guidance for
security in the data processing environment, but the concepts presented are also applicable to
non-DoD systems, and to DoD embedded and C3I systems, as well.

Security professionals have emphatically asserted that security issues must be considered from
the very beginning of the planning of the system, in order to avoid significant problems in terms
of cost, schedule, and operational capability that occur when the need for security is not
recognized until late in the system development process. Therefore, the emphasis in this course
is on the early stages of system specification and acquisition, especially Functional Requirements
Definition, Security Requirements Definition, Concepts Development, and System Design. The
principal notion conveyed is the importance of performing these and all other steps throughout
the development and acquisition process in such a manner as to facilitate the eventual
accreditation of the system. Although the course is not oriented towards a security manager
having operational responsibilities (e.g., the Information System Security Officer for a local area
network or for a data processing installation), nevertheless many of the concepts taught are also
applicable in an operational environment.












COURSE TITLE: The CMW: Administrator Tutorial
COURSE LENGTH:

VENDOR:
Trusted Systems Training, Inc.
1107 South Orchard Street
Urbana, IL 61801-4851
Steve Sutton: (217) 344-0996

The course addresses the security administration of Compartmented Mode Workstations based
on the SecureWare technology, including SecureWare's CMW+, Hewlett-Packard's BLS, and
Digital's MLS+. It teaches the management of all new security features, like Protected
Subsystems, user accounts, security auditing, secure import/export, the CMW "Encodings file,"
and trusted (MaxSix) networking. The course book and accompanying textbook include written
and on-line, self-paced exercises that form the basis for classroom learning.

COURSE TITLE: Computer Viruses, Trojan Horses, and Logic Bombs
COURSE LENGTH: 2 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

This seminar examines the insidious threats to computer systems posed by malicious
programming, including viruses, Trojan horses, worms, logic bombs, and trap doors. We will
examine the broad spectrum of harmful code, the people who create it, how viruses get into
systems, demonstrations of illicit programs, and countermeasures. The impact of malignant
programming extends well beyond any immediate file damage. Hidden losses, such as
reconstruction of programs and data, and exhaustive detective work may be necessary. What
types of people would infect our systems....are they employees, competitors, outsiders? We will
review the latest legal cases relating to viruses and logic bombs, Examples of anti-virus software
- what these "digital pharmaceuticals" can and cannot do. Realistic approaches for controlling
the problem, and solutions which have worked. Note: Attendees are encouraged to provide
examples, from their own experience, of destructive programming threats and effective technical
and administrative countermeasures they have used. NOTE: Ask about available discount for
government hosted classes.






COURSE TITLE: Microcomputer Security
COURSE LENGTH: 3 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

This participative program examines the security issues around microcomputer use, with emphasis
on identifying issues and developing plausible solutions for your real-world environment. The
development of PC security issues and what the future holds. Security weaknesses of
microcomputers and where PC security differs from mainframe security. Physical protection for
the machines and associated media, plus data access control and virus prevention, with
demonstrations of related products. Contingency planning for personal computers. Policies and
procedures for controlling the spread and use of PCs. Software piracy and how to prevent it in
the workplace. The value of a comprehensive and continually updated security awareness
program in achieving your PC security objectives. Designed for DP and information center
managers, security officers, and EDP auditors. NOTE: Ask about available discount for
government hosted classes.

COURSE TITLE: Computer Security For Security Officers
COURSE LENGTH: 2 DAY

VENDOR:
USDA, Graduate School
600 Maryland Ave, SW
Washington, DC 20024
(202) 447-7124

This workshop will show you how to improve the computer security program in your agency.
Through lectures, discussion, case studies and checklists you will be able to determine the
strength of your current security program, and to pinpoint potential problem areas that need
attention. You also will learn about your responsibilities with your agency management in terms
of policy development and contingency planning.









COURSE TITLE: CS 230 - Information Policy
COURSE LENGTH:

VENDOR:
The George Washington University
Department of Electrical Engineering & Computer Science
Washington, DC 20052
Professor Lance Hoffman: (202) 994-4955

Issues related to computers and privacy, equity, freedom of speech, search and seizure, access
to personal and governmental information, professional responsibilities, ethics, criminality, and
law enforcement. This course examines these policy issues using the current literature and
written, electronic, and videotape proceedings of recent major conferences and government
hearings. Prerequisite CS 131 (Programming of Data Structures) or equivalent.

COURSE TITLE: Security and Control in Automated Systems-Audit IS
COURSE LENGTH: 3 DAYS

VENDOR:
USDA Graduate School
600 Maryland Ave., S.W.
Washington, D.C. 20024
(202) 382-8620

Internal auditors have a major role in reviewing the security and controls in sensitive automated
systems. This course provides practical guidelines ant techniques for auditing and evaluating the
adequacy of security and internal controls in sensitive automated systems. Major problem areas
are discussed and examples illustrating the results of inadequate security and controls are
presented. In addition, the responsibilities of management, internal audit, and data processing
personnel are discussed. This course also provides the attendee with a comprehensive
methodology for conducting security and internal control audits of sensitive data processing
systems. Using a case study approach, the course illustrates how to identify and quantify the
vulnerabilities of automated systems to fraud, disclosure, delay and other threats. The internal
control techniques which can be applied to address these vulnerabilities are discussed, as well
as the requirements of OMB circulars A-127 and A-130.










COURSE TITLE: Fundamentals of Computer Security for Federal Information Systems
COURSE LENGTH: 5 DAY

VENDOR:
USDA Graduate School
600 Maryland Ave., S.W.
Washington, D.C. 20024
(202) 447-7124

This five-day course provides those responsible for computer security with an overview of
security issues specifically related t the federal government. Designed to introduce and cover the
fundamentals areas of concern facing computer security officers, from mainframe to PC's. The
objectives are covered by lecture, group discussion, slide and video presentations. The instructor
will provide extensive insights into computer security based on operational experiences. In
addition, hands-on risk analysis exercises will be performed. The student will be provided with
extensive materials, including demonstration diskettes and public domain anti-virus software.

COURSE TITLE: Computer Security Seminar
COURSE LENGTH: 3 DAYS

VENDOR:
ARCA
Commerce Center
10320 Little Patuxent Parkway
Suite 1005
Columbia, MD 21044
(410) 715-0500

This computer security seminar focuses on the hardware and software mechanism which can be
used to implement specific TCSEC security functionality. Computer security concepts,
requirements, and implementation examples are presented for policy enforcing mechanisms,
accountability mechanisms, and underlying architectures supporting the reference monitor
concept. Issues on integrity, covert channels and trusted applications are also discussed. In-class
exercises and practical examples reinforce the important concepts presented in the lecture
materials. The seminar concludes with discussions of several evaluated products.










COURSE TITLE: Network Security Seminar
COURSE LENGTH: 3 DAYS

VENDOR:
ARCA
Commerce Center
10320 Little Patuxent Parkway
Suite 1005
Columbia, MD 21044
(410) 715-0500

In this seminar you will learn how to integrate and implement secure networks. You will be
introduced to network security concepts, fundamentals, network threats, and the Trusted
Network
Interpretation [TNI] of the TCSEC. Security properties required of a trusted network, secrecy,
integrity and availability are described per the OSI security services model. Interconnection of
separately accredited AIS systems is discussed focusing on possible cascading problems. The
group project has students design a hypothetical network security architecture, identify the
necessary evaluation class(es), analyze the network data flows, and specify the assurance
requirements. The seminar concludes with an overview of secure networking products and efforts.

COURSE TITLE: Database Security Seminar
COURSE LENGTH: 3 DAYS

VENDOR:
ARCA
Commerce Center
10320 Little Patuxent Parkway
Suite 1005
Columbia, MD 21044
(410) 715-0500

This seminar addresses how to use multilevel databases management systems effectively and as
an integrated part of a system solution. The seminar introduces database security issues and
problems and familiarizes participants with the NCSC~s Trusted Database Management System
Interpretation [TDI] of the TCSEC. Several approaches to building multilevel database systems
are presented: integrity lock, kernelized, layered, partitioned and distributed. Topics include;
database design considerations view versus relation discretionary controls, mandatory controls,
inference, and aggregation. Class exercises and practical examples are used to reinforce concepts.






COURSE TITLE: Comprehensive INFOSEC Seminar
COURSE LENGTH: 5 DAYS

VENDOR:
ARCA
Commerce Center
10320 Little Patuxent Parkway
Suite 1005
Columbia, MD 21044
(410) 715-0500

This seminar provides an intensive presentation of INFOSEC topics by combining ARCA~s
INFOSEC Foundations, Computer, Network, and Database Security seminars. Critical INFOSEC
topics from these public seminars are presented in detail and other topics are summarized in a
single week. This seminar provides an excellent start-up for an engineering organization starting
an MLS or security program or expanding its security staff.

COURSE TITLE: Communication Security Principles & Practices
COURSE LENGTH: 2 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

This workshop is for data processing managers, security officers, and auditors who have little or
no knowledge in the communications area. Because communications systems are so complex and
vulnerable, the data processing operation is a substantial risk. You will learn about the basic
concepts and the terminology needed to communicate effectively with technicians. The emphasis,
however , is on vulnerabilities and the practical security safeguards you can implement. Because
the largest communications risk faced by most organizations is unauthorized access to their
computers, considerable emphasis will be placed on how mainframe access control mechanisms
interface with other communication security techniques. In particular, you will learn to address
the three major risks - loss of network service, unauthorized access to your network and data
center resources, and surveillance of your network traffic. "Special Note" You are encouraged
to prepare, in advance of the Workshop, a description of specific communications security
problems being faced within your own organization. Cases will be discussed as time permits and
as issues arise during the Workshop. NOTE: Ask about available discount for government hosted
classes.




COURSE TITLE: Managing Computer Security-Mergs, Acq, and Divestitures
COURSE LENGTH: 2 DAY

VENDOR:
Computer Security Institute
600 Harrison Street
San Francisco CA 94107
(415) 905-2626

Mergers, acquisitions, and divestitures are common in today's corporate environment.
Unfortunately, while these situations can create serious information protection problems, security
is usually considered only after the financial, legal, and structural issues have been settled. This
seminar for security officers, DP managers, and auditors examines what to do before, during and
after a major organizational change to ensure the adequate controls are in place. Computer
security problems in merger/acquisition/divestiture situations, and what we can do about them.
How major internal reorganizations, functional, consolidation, and plant closings affect security.
These days many large corporations are "outsourcing" - getting out of the DP business by
contracting all DP operations to an outside vendor. When this occurs, how do we ensure that the
vendor properly protects our sensitive data and applications? What conditions increase an
organization's vulnerability? Risk-reducing countermeasures. NOTE: Ask about available
discount for government hosted classes.

COURSE TITLE: Computer Security And Privacy
COURSE LENGTH:

VENDOR:
Johns Hopkins University
9601 Medical Center Drive
Rockville, MD 10850
(301) 294-7070

This course surveys the broad fields of computer security and privacy, concentrating on the
nature of the computer security problem by examining threats to systems, types of computer
systems, and areas of system security and protection. Policy considerations related to the
technical nature of the problem as manifested in government regulations and commercial
practices are examined. The course develops the student's ability to assess system security
weakness and formulate technical recommendations in the areas of hardware. Additional topics
include access control (hardware/software), communications and network security, and the proper
use of system software (op. system and utilities). The course addresses the social and legal
problems of individual privacy in a data processing environment, as well as the computer "crime"
potential of such systems. Several data encryption algorithms are examined. A student project or
programming assignment may be required.


COURSE TITLE: Auditing the Data Center for Controls, Efficiency, and Cost-Effectiveness
COURSE LENGTH: 2 DAY

VENDOR:
MIS Training Institute
498 Concord Street
Framingham, MA 01701
(508) 879-7999

As an auditor in today's business environment, you must be familiar with the information
processing function. In this seminar you will learn the components of a data center and the
controls necessary to ensure accurate and reliable processing. The course covers data center
operations, administration, scheduling, physical and data security, program change control,
incident reporting, disaster recovery, and more. The seminar focus is on mainframe data centers,
but includes security and audit responsibilities for mini and microcomputer environments as well.
Participants should have attended IS Auditing and Controls or Auditing Automated Business
Applications.

COURSE TITLE: Data Security Planning
COURSE LENGTH: 3 DAY

VENDOR:
IBM Management Institute
19th Floor
Chicago, IL 60611
(312) 245-3791

This course incorporates the latest thinking on data security planning and discusses practical
methods used by leading companies. It presents the policies and guidelines of IBM and other
organizations to help resolve the issues facing you and your organization. This course should
be attended by staff or line management responsible for implementing or enhancing the data
security program. It is also intended for data security administrators, auditors and others with
a specific interest in data security. This is a management course, not a technical course. It is
appropriate for organizations with large or small DP installations.










COURSE TITLE: Computer Viruses: Detect, Prevent, Cure Infections
COURSE LENGTH: 2 DAY

VENDOR:
CENTER for Adv. Professional Develop.
1820 E. Garry St.
Santa Ana, CA 92705
(714) 261-0240

Most of those who work with computers are aware of the existence of something called
"computer virus," and the fact that it may be a danger to their computers or data. But it is hard
to get good answers to the questions of what, exactly, a virus is, how great a danger it represents,
and how to defend against any damage it might cause. Covering technical details where
necessary, but always in non-technical language, this course will tell you what viri are, how they
attack, how you can defend against them, and what the existence of viri mean to you and your
use of computers. The course will give you a complete overview of all known ways that viri have
"reproduced," and the various types of damage they have done. New viri are constantly being
written so the course is constantly being updated, and research into ways that viri could attack,
but haven't yet, will be reported.










Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close