Anyone who needs to know and understand the elements of e-commerce, from a security or audit standpoint should attend this course. More specifically this course is for:
- Application developers seeking a wider view of the wired-world.
- IT managers wishing to understand how the technology fits together and what the risks are.
- Senior users or system owners wishing to establish sources of risk.
- E-commerce project managers.
- Computer auditors and computer audit planners.
- Computer security specialists.
- Business risk analysts.
- Legal experts who need to understand how e-commerce works and how the components are connected together.
Delegates should have a reasonable knowledge of IT in general. You should feel comfortable investigating system settings through a Windows GUI interface, as well as entering line commands in console environments. Some investigations may be carried out on a UNIX platform. The course has technical content, but this is technically in breadth, rather than depth.
3 days. Hands on
The courses aims to show you how e-commerce works, what the main risks are and how best practice should follow to mitigate those risks. The IT technical components will be explained, so delegates will understand how the various elements work together. The organizational and management aspects of e-commerce, equally critical, are also addressed. Delegates will have a chance to examine technologies first hand – PKI software, a web site, CGI programs, a firewall and much more. We will show you how to find your way around web sites representing best practice in e-commerce.
Communications Protocols used on the Internet
Web Browsers and Servers
Hosting Web Services
Web Related Programming Environments
Building an E-commerce Trust Infrastructure
System Security Checks