Sei sulla pagina 1di 3

BCSE WhiteHat Bkav Certified Security Essential WhiteHat, a course for cyber security executives BCSE WhiteHat course provides learners with essential knowledge about cyber security issues for a professional network administrator:

Methods of designing a safe and secured network system;

Intrusion and attack techniques commonly used by hackers, measures to effectively detect and prevent attacks;

Methods of protecting websites against attacks, ensuring security for website systems

Mechanism of action of computer viruses, malicious code and total protection solutions;

Measures and instructions to use effectively monitoring tools, vulnerability checkers of network systems;

Legal issues relating to cybercrime;

Common encryption methods and the application of encryption in network systems;

The above knowledge is also important premise to help learners become experts in cyber security.

I. BCSE WhiteHat course content

BCSE WhiteHat course has 40-hour duration and is divided into 8 topics:

Topic 1: Security Overview

Part 1: The importance of security

Part 2: Basic Access

Part 3: Authentication Methods

Part 4: Authorization

Part 5: Accounting

Case-study: Common cyber attack

Topic 2: Infrastructure Security

Part 1: Network Security Topologies

Part 2: Firewall

Part 3: IDS/IPS

Part 4: VPN

Part 5: NAT

Part 6: Load balancing

Part 7: WAN Optimize

Part 8: VLAN

Part 9: NAC

Part 10: Wifi

Part 11: Storage Security

Part 12: Virtualization

Part 13: Media Security

Case-study: Establishing Firewall and VPN for a business

Topic 3: Cryptography (Mã hóa)

Part 1: Basics of Cryptography

Part 2: Cryptography methods

Part 3: PKI (Public Key Infrastructure)

Part 4: Crytography standards and protocols (Cryptography standards and protocols)

Case-study: Establishing system using IPSec for a business

Topic 4: Application Security

Part 1: Software Security

Part 2: Remote Access Security

Part 3: Email Security

Part 4: Application Security Baselines

Part 5: Network Security Analysic tool

Case-study 1: Establishing a secure email system

Case-study 2: Checking the existence of SQL Injection and remedies

Topic 5: Computer Virus and Malicious Code

Part 1: Malware definition

Part 2: Malware classification

Part 3: Malware prevention

Part 4: Malware detection and removal

Case-study: Antivirus solution for a large business

Topic 6: Web Security

Part 1: Website system overview

Part 2: Website vulnerabilities

Part 3: Prevention

Case-study 1: Detecting and removing backdoor

Case-study 2: Delimiting attack

Topic 7: Cybercrime and Legal Issues

Part 1: Cybercrime Situation in Vietnam

Part 2: Cybercrime-related Laws in Vietnam

Case-study: Analyzing some typical cases concerning cybercrime in Vietnam

Topic 8: ISO 27001

Part 1: Why ISO 27001

Part 2: ISO 27001 Implementaion

Part 3: An Example of ISO 27001

Case-study 1: Building general security policy

Case-study 2: Identifying risks and security flaws

II. Requirements for learners

Basic knowledge of operating system

Basic knowledge of TCP/IP and computer network

Basic knowledge of programming

Knowledge of basic apps: Web, mail, DNS, etc.