This course teaches the principles and techniques of security threats and vulnerabilities. Delegates will also learn how to: 1. Design network and implement security measures, procedures 2. Conceive various security policies 3. Conduct network penetration testing 4. Plan data and disasters recovery guidelines LEARNING OUTCOMES Upon successful completion of this course, the delegate will be able to: 1. Be able to design a secure system. 2. Understand and explain the standard cryptographic tools 3. Implement encryption and decryption algorithms DES, 3DES, AES, … 4. Enforce authentication, confidentiality, authorization, access control, and confidentiality procedures. 5. Apply apache, and IIS web servers’ security policies. 6. Create digital certificates and enable SSL for critical web pages. 7. Build security associations for the IPSEC protocol security authentication methods. 8. Understand and evaluate security vulnerabilities in different type of software to avoid sever attacks like the SQL injections, cross site scripting, and buffer overflow.