Compartir en

Plazo
9 May 2013
El registro está cerrado.

CIFAL Shanghai- The 1st China Aid Training Course: Information Security Technology for Developing Countries

Tipo
Course
Ubicación
Shanghai, China
Fecha
-
Duración
55 Days
Área del programa
Local Development
Precio
0,00 US$
Correo Electrónico del Centro de Coordinación del Evento
cifalellie@126.com
Inscripción
By application & selection
Tipo de aprendizaje
Face-to-Face
Idioma(s)
English
Protección de Datos y Privacidad
Los datos personales de los participantes que solicitan, se registran o participan en los cursos y otros eventos de UNITAR se rigen por la Política de Privacidad y Protección de Datos. Al solicitar, registrarse o participar en este evento, el participante reconoce que conoce dicha política y aceptan sus condiciones.
The vision and challenge of information security technology application are faced by participants from various fields such as government departments, financial system, enterprises and urban development, etc.
 
In order to learn more comprehensive knowledge on principles of information security and its application, they are introduced to China’s practice and achievements in the field of application and development of information security technology. 

 

 

1.      The training is believed to help participants to acquire necessary knowledge about information management and security prevention technology.

 

2.     

Also the training is believed to further promote economic and technical cooperation in the field of information security technology between China and the trainees countries.

 

 

The course on Information Security Technology bears the mission to arm participants with 
 
1.      More comprehensive knowledge on principles of information security and its application
 

 

2.      Necessary knowledge about information management and security prevention technology
The program is divided into thematic lectures, special subjects, free discussion, case studies and spot investigation.
 
Therefore, the various modules of lectures below will be referred to during the training course:
 
1.    Module 1:Overview of Information Security, Information Security Products, Information Security Technology and Projects, Information Security Management, Network Security, Information Protection Technology, Information Security Laws and Regulations, and Information Security Solutions, etc.
 
2.    Module 2: application of information security hardware and software products, fault diagnosis, purchasing and testing, adjusting, security system formulation and security responsibility confirmation.
 

 

3.    Technical Visit: Participants will have opportunities to visit several famous information security enterprises and institutes in Shanghai, Zhengzhou, Kaifeng, Luoyang, Hangzhou, Wuxi, etc. 

Face to face

 

 

Officials and technicians engaged in information and communication security management and other related fields