Price:
$2,675.00
Days:
1
Virtual
– • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
– • Implement secure network architecture concepts and systems design
– • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
– • Install and configure identity and access services, as well as management controls
– • Implement and summarize risk management best practices and the business impact
– • Install and configure wireless security settings and implement public key infrastructure
• Two years of experience in IT administration with a security focus.
• Basic Windows user skills.
• Fundamental understanding of computer and networking concepts.
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• General Security Concepts
• General Security Concepts
• General Security Concepts
• General Security Concepts
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Threats, Vulnerabilities, and Mitigations
• Security Architecture
• Security Architecture
• Security Architecture
• Security Architecture
• Security Operations
• Security Operations
• Security Operations
• Security Operations
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
• Security Program Management and Oversight
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.