SECO – IT-Security Foundation


Our classroom training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.


Catering to the demands of busy professionals, our virtual training programs are as effective as face-to-face learning.


Our Corporate training provides you the opportunity to interact with instructors and benefit from face-to-face instruction.


High quality training from Certified & Industry Experts

Earn 16 PDUs

Course Completion Certificates

Reimbursement guaranteed if the training is not satisfied

Extensive documentation provided

Our approach is both practical and inspirational. Our training is carefully designed and tested to develop the key skills and confidence needed while being highly participatory and fun

The IT-Security Foundation course is a two-day course aimed at developing basic knowledge about securing and defending an IT infrastructure environment. The slides cover all examination topics; no additional literature is required to prepare students for the exam.

Day 1:

●     Introduction to IT-Security Foundation
●     Learning objectives
●     Security in Networks, Systems and Software
●     Understanding the different types of computer systems and their vulnerabilities from a security point of view
●     Understanding TCP/IP networking
●     IP and IPV4 security, Wi-Fi and attacks on networks
●     Relevance of understanding applications and application vulnerabilities

Day 2:

●     Security in Networks, Systems and Software
●     Understanding databases and database vulnerabilities
●     Security through Cryptography and Access Control
●     Understanding cryptography in terms of implementing effective security measures
●     Definition of identification and examples of identity attributes
●     Common (Ab)use Cases
●     Understanding cloud computing and the related risks
●     Understanding how cybercriminals exploit vulnerabilities to be able to implement appropriate security controls
●     Summary of all modules
●     Refer to Summary / Recapitulation activities

The course provides candidates with an overview of the most important technological aspects of an IT infrastructure. The main aim of the course is to help candidates acquire a global understanding of the security impact of each of these technological aspects.

The course consists of three modules:

●     Module 1: Security in Networks, Systems and Software
●     Module 2: Security through Cryptography and Access Control
●     Module 3: Common (Ab)use Cases
●     Managers who wish to understand more clearly what is required from security specialists without engaging in technical details, and
●     Professionals who wish to attend further specialised security trainings in the future

What does Mangates provide me on the day of the course?

We provide Course Materials, Course Completion Certificate and Refreshments

What experience does Instructor has?

All our Instructors are Certified & Industry Experts and they have years of experience in the same filed.

Do you provide a group discount for classroom training programs?

We do Provide Group Discounts such as 10% for group of 3, 15% for group of 5 and 20% for the group of 10 people.

If I cancel my Enrollment, how can I claim my Refund?

You can request a refund by sending an email to and within 7 working days you get your money back. © 2019 . All rights reserved.