GIAC Information Security Fundamentals (GISF) Certification (Part 2 of 7): Information Security Assurance


In order to ensure that your information system is devoid of threats and other vulnerabilities, you need to create an efficient security architecture to safeguard all devices that are connected to a network. You may also have to implement secure authentication methods and use cryptographic techniques to allow only privileged users to gain access to the information systems and to ensure that the confidentiality of information is maintained.


  • In this course, you will analyze the security architecture and design, data access control techniques, attack methods, authentication types, and cryptography characteristics and elements.

Hardware and Software Required:

  • Browser Microsoft Internet Explorer 7 (or higher)
  • Browser Mozilla Firefox 2 (or higher)
  • Browser Apple Safari 2 (or higher)
  • Operating System Microsoft Windows 2000, XP, Vista, or Windows 7
  • Operating System Apple Mac OS X 10.4 (or higher)
  • Processor Pentium III 1 GHz (or better)
  • Processor Macintosh Intel-based or PowerPC G4 (or better)
  • RAM 512 MB (1 GB or more recommended)
  • Internet connection 256K (broadband recommended)
  • Adobe Flash Player 8 (current version recommended)
  • Adobe Reader 7 (or higher)
  • Other requirements may apply to supplemental offline activities. Omitting these optional activities does not affect course completion.


User Reviews

Not yet rated. You will need to follow this course before you can write a review.

Course Info

  • Code: EL-SFC 2
  • Duration: 2 hours 45 minutes
  • Price: Call for price

Next Step

Enquire Now
Tell a Friend