Sie sind auf Seite 1von 7

Click to edit Master title style

Information Security Management

Click to edit Master text styles


Second levelMODULE 1
Third level Data Networks and
Fourth
level
Telecommunications Security
Fifth level
Presented by
LTC PhD. eng. Cezar Vasilescu
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES

Who are we?

Click to edit Master title style


Click
to edit Master
text styles
An
intellectual
community

Second level
prepared to contribute with own
Third level
knowledge, experience and ideas
Fourth level
Fifth level

REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES

Expectations: These Classes


Click to edit Master title style

ARE
ARE
NOT
Click to edit Master text styles
Second level
Technical Training
Executive
Education
Third level
Focused on Analysis
Focused
Synthesis
Fourthonlevel
School Solutions
Multiple
Answers
Fifth level
Critical Thinking

Memorization

WHAT & WHY

HOW

To know what you dont know

Know it all

REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES

Rules

Click to edit Master title style


Courtesy
listen
to each
othertext styles
Click
to edit
Master
Respect
& tolerance to different
Second
level
opinions
Third level
Listenlevel
actively
Fourth
Academic
freedom
Fifth
level
We encourage intellectual exploration and
discussion.

Non-Attribution

Class discussions stay in the seminar room


REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES

The Method

Click to edit Master title style

Seminar
a topical
discussion
Click to edit
Master text
styles conducted in
a collegial
atmosphere
Second level

Third level each contributes with


Participative

Fourth level
valuable
experience and perspectives

Fifth level

Assessments practice new skills and


employ new approaches in a nonthreatening atmosphere
REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES

AGENDA

Click to edit Master title style

1. The Principles of Information Security


2. Networking

Click to edit Master text styles


3. Network security devices
Secondsecurity
level techniques
4. Network
Third level
5. Threats
and vulnerabilities
6. Vulnerabilities
Fourth level management
7. Security
policies and awareness
Fifth level
8. Risk management
9. Incident response
10. Disaster recovery and business continuity
11. Exercise - Wireless Networks Security

REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES

Expectations:
Click to edit Master title style
Most of All, these classes
forMaster
all of
to:
Clickare
to edit
textus
styles

Second level
Learn Grow Explore Discover Listen
Third level
Research Think Critically
Understand
Fourth
level
Fifth
level Try Innovate Inquire Network
Explain
Develop

Create

Do your best

Assess

Evaluate

Have fun

REGIONAL DEPARTMENT OF DEFENSE RESOURCES MANAGEMENT STUDIES

Das könnte Ihnen auch gefallen