Do you want to keep all your personal data private and confidential make sure your confidential communication stays confidential? Do you want to prevent data leaking in case of loss or theft of your computers or storage media?Are you looking [...]
  • GOC51
  • Duration 2 days
  • 30 ITK points
  • 8 terms
  • Praha (9 000 Kč)

    Brno (9 000 Kč)

    Bratislava (450 €)

  • Beginner

Do you want to keep all your personal data private and confidential make sure your confidential communication stays confidential? Do you want to prevent data leaking in case of loss or theft of your computers or storage media?Are you looking for protection against interception of telecomunication traffic without giving up the benefints of modern communication? Then we have a unique training opportunity for you with our best security trainer who will explain how to implement correct security procedures so that you can get secure against NSA, industrial espionage or even police commando that will burst into the company and confiscate all your IT equipment. During this practical two-day course you will see that implementation of security measurements is not particularly difficult. You can try all the procedures during practical demonstrations in real environment.

»

This training is suitable for advanced computer users who want to keep their personal identity private information confidential. The training is also beneficial for beginning security administrators who want to keep the company data safe even on portable computers and media or during email communication outside the company.

  • Understading the principles of cryptography and digital signature
  • Securing the storage of company sensitive data
  • Securing against interception of your email communication
  • Practically implement encryption of hard drives, USB tokens and email communication
  • How to obtain personal certificate and how to keep it safe

Advanced computer user of Microsoft Windows operating system

  • The required minimum theoretical knowledge
  • What is encryption, digital signature and how to use them
  • Symmetric and asymmetric cryptography
  • Protection of stored data
  • Encryption of files from Word password protection to TrueCrypt
  • How to easily create or buy a really secure storage medium
  • Encryption of hirde drives
  • Secure start of PC, what is TPM and UEFI Secure Boot
  • Encryption of OS drives with BitLocker and TrueCrypt
  • Beyond the encryption protection limits - the danger of DMA
  • Data transfer protecion
  • Dual side implementation of security
  • Obtaining of personal certificate for securing your email freely or from commercial certification authorities
  • Backup and recovery of personal certificates
  • Digital signature and encryption of emails in Microsoft Outlook, Windows Live Mail and Mozilla Thunderbird
  • Encrypted Instang Messaging and voice calls
Current offer
Training location
Course language

The prices are without VAT.