Price:
$2,895.00
Days:
1
Virtual
– • Key concepts in cybersecurity, including information security and network security
– • Information security threats, vulnerabilities, and attacks
– • The different types of malware
– • Identification, authentication, and authorization
– • Network security controls
– • Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management)
– • Application security design and testing techniques
– • Fundamentals of virtualization, cloud computing, and cloud security
– • Wireless network fundamentals, wireless encryption, and related security measures
– • Fundamentals of mobile, IoT, and OT devices and related security measures
– • Cryptography and public-key infrastructure
– • Data security controls, data backup and retention methods, and data loss prevention techniques
– • Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
– • The incident handling and response process
– • Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
– • Concepts in business continuity and disaster recovery
– • Risk management concepts, phases, and frameworks
No specific prerequisites are required for this course. Basic computer literacy and familiarity with fundamental concepts in the subject area are recommended for the best learning experience.
• Incident Response
• Network Logs Monitoring and Analysis
• Network Traffic Monitoring
• Computer Forensics
• Risk Management
• Virtualization and Cloud Computing
• Application Security
• Mobile Device Security
• Wireless Network Security
• Data Security
• Network Troubleshooting
• Cryptography
• IoT and OT Security
• Network Security Assessment Techniques and Tools
• Network Security Controls – Technical Controls
• Business Continuity and Disaster Recovery
• Network Security Controls – Physical Controls
• Network Security Controls – Administrative Controls
• Information Security Threats and Vulnerabilities
• Identification, Authentication, and Authorization
• Network Security Fundamentals
• Information Security Attacks
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.