Current location - Education and Training Encyclopedia - Education and training - Training objectives of network information security engineers
Training objectives of network information security engineers
The training objectives of NSACE projects at all levels are as follows:

1. Primary goal

At this level, trainees are trained to undertake small-scale network information security work. Have a complete understanding of network information security, master computer security protection, website security, e-mail security, intranet network security deployment, operating system security configuration, malicious code protection, common software security settings, firewall applications and other skills.

2. Intermediate goal

At this level, students have received comprehensive professional training and can improve and optimize enterprise information security systems and processes. Information security can meet the requirements of specific specifications, track and verify the implementation of security measures in the system, establish a three-dimensional and in-depth security protection system, deploy security monitoring mechanisms, and warn and track unknown security threats.

3. High-level goals

At this level, students can evaluate, improve and upgrade security policies, operating procedures, rules and regulations and security measures step by step and regularly, and can organize the establishment of their own information security systems. Information security management can be combined with the specific situation of the unit, formulate corresponding management systems and processes, put forward the concept of information security management, and promote it to the specific management activities of the unit. In terms of technical ability, it can check the safety measures in the system of the unit as a whole, master the vulnerability analysis method of the protection system, and put forward suggestions for improving the safety protection system. Familiar with information security industry standards and product characteristics, familiar with the development trend of information security technology, able to choose appropriate security technology and products according to the information security needs of the unit.