Open space for technologists, investors, tech companies and hackers in Nairobi.

softlockheader cpy

iHub By Joseph / January 22, 2014

Digital Secur­ity Academy: Applic­a­tions Open

0 Comments

Strathmore-​Softlock Digital Secur­ity Courses

@iLabAfrica Africa has partnered with Soft­lock, the lead­ing Digital Secur­ity com­pany to offer courses in Digital Secur­ity. The Courses will be offered in Strath­more Uni­ver­sity at the new Digital Secur­ity Academy in @iLabAfrica.

The courses provided hands-​on IT secur­ity skills to vari­ous stake­hold­ers in the IT industry.

 

Mode of Delivery

· Full-​time

· In-​House (Offered to cor­por­ates on request)

Who should attend?

The Strathmore-​Softlock Digital Secur­ity Courses are inten­ded for busi­ness exec­ut­ives, IT secur­ity pro­fes­sion­als, IT tech­ni­cians and Soft­ware developers.

Why take the Courses at Strathmore?

iLabA­frica is a cen­ter of Excel­lence in IT secur­ity in Strath­more Uni­ver­sity. Our Digital Secur­ity Course are offered in col­lab­or­a­tion with Soft­lock, a world leader in digital secur­ity. We have courses cus­tom­ized for vari­ous stake-​holders in the IT industry.

Start Date

3rd Feb­ru­ary 2014

Cost and Duration

· IT Secur­ity Exec­ut­ive Track (1 day) : KES. 30,000

This course equips top Busi­ness Exec­ut­ives with in-​depth under­stand­ing of IT Secur­ity threats and the asso­ci­ated risks that face their organ­isa­tions as well as the meth­ods and tools for mit­ig­at­ing them. It is primar­ily dir­ec­ted to Com­pany Dir­ect­ors, top Exec­ut­ives and Senior Man­agers who are tasked with the stra­tegic man­age­ment of IT sys­tems and procedures.

· IT Secur­ity Busi­ness Track (1 day) : KES. 18,000

This course provides IT Secur­ity aware­ness to admin­is­trat­ors who need to know how to man­age IT risks in their organ­isa­tions. The course tar­gets Middle level Man­agers, Heads of Depart­ments and Sec­tions, ICT Man­agers, Inform­a­tion Secur­ity Officers, Busi­ness Con­tinu­ity Man­agers, and other staff tasked with imple­ment­a­tion and man­age­ment of IT sys­tems and procedures.

· IT Spe­cial­ist Track (4 days): KES. 50,000

This track intro­duces vari­ous secur­ity solu­tions that can inform the decisions made by Secur­ity spe­cial­ists. It is designed for IT staff who is involved in IT Secur­ity Man­age­ment. The course seeks to ensure that Secur­ity spe­cial­ists can make informed decisions that will improve their organisation’s security.

The train­ing will cover the fol­low­ing topics:Digital Secur­ity Solutions.

  1. Secure Authen­tic­a­tion and Digital Signatures.
  2. Soft­ware and Data Protection.
  3. Sys­tem Protection.

· IT Tech­nical Track (7 days): KShs. 80,000

This course trains IT pro­fes­sion­als to imple­ment optimal secur­ity of their inform­a­tion assets. It fol­lows a hands-​on approach with sev­enty per cent prac­tical work and thirty per cent case study analysis.

The train­ing will cover:Intro­duc­tion to Secure Authen­tic­a­tion and Digital Signatures.

  1. Digital Sig­na­ture Back­ground: Over­view, Cryp­to­graphy, Sym­met­ric Encryp­tion, Hash­ing, Asym­met­ric Encryp­tion, Cer­ti­fic­ates, Cer­ti­fic­ate Authorities.
  2. Soft­lock Smart Token: Fea­tures and Applications.
  3. Cer­ti­fic­ate Issu­ing with User Tool, Simple Author­ity, Web Cer­ti­fic­ate Author­it­ies and Microsoft Cer­ti­fic­ate Authority.
  4. Secur­ing eMail with Microsoft Out­look and Thun­der­bird eMail Clients.
  5. Secur­ing doc­u­ments with Adobe Acrobat and Microsoft Office.
  6. Secur­ing Net­work communication.
  7. Secur­ing Web communication.
  8. Secur­ing VPN communication.

· IT Soft­ware Developer Track (10 days): KShs. 120,000

This track tar­gets soft­ware developers with the aim of equip­ping them with the skills neces­sary to design, imple­ment and deploy secure sys­tems and applic­a­tions. The highly prac­tical code devel­op­ment approach will be irre­place­able to developers and pro­gram­mers who tar­get build­ing secure implementations.

The fol­low­ing top­ics will be covered:Digital Sig­na­ture Back­ground: Over­view, Cryp­to­graphy, Sym­met­ric Encryp­tion, Hash­ing, Asym­met­ric Encryp­tion, Cer­ti­fic­ates and Cer­ti­fic­ate Authorities.Struc­ture Inter­faces: PKCS Inter­face, CDP Inter­face, SDK Inter­face, Devel­op­ing soft­ware applic­a­tions with C /​Java /​C# /​VB /​JavaS­cript /​VBScript /​Oracle /​Power Builder, Device Man­age­ment, User Man­age­ment, Ses­sion Man­age­ment, Object Man­age­ment, Cryp­to­graphic Oper­a­tions, Key Man­age­ment and Cer­ti­fic­ate Management.

  1. Devel­op­ing Secure Com­mu­nic­a­tion Soft­ware using the SDK Inter­face and C#.
  2. Under­stand­ing Stand­ard Inter­faces (PKCS Inter­face and
    CSP Inter­face

    CSP Inter­face)

  3. Devel­op­ing with dif­fer­ent pro­gram­ming lan­guages (2 Lan­guages beside C#).
  4. Using C++ with SDK, CSP and PKCS.
  5. Using C# with SDK and CSP.
  6. Using VB with SDK and CSP.
  7. Using Java with SDK/​JNI and PKCS.
  8. Using Oracle with SDK/​PLL.
  9. Using Power Builder with SDK/​PBDLL.
  10. Using Web Scripts with SDK/​SV.

Click here to register and for more information.

Author : Joseph

A USIU trained journalist & an aspiring animator Joseph thrives behind the camera. He is a still photography and videography aficionado. Joe is currently the director/editor behind African Tech Bits, an iHub production that features start ups in the tech scene. This Canonite can mostly be seen at the iHub in the company of his Canon 550D.


    No comments yet

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


{{ theme:js file="jquery.fittext.js" }}