Price:
$3,695.00
Days:
1
Virtual
– • Understanding network security management
– • Establishing network security policies and procedures
– • Windows and Linux security administration
– • Setting up mobile and IoT device security
– • Implementing data security techniques on networks
– • Embedding virtualization technology security
– • Determining cloud and wireless security
– • Deploying and using risk assessment tools
– • Learning basics of first response and forensics
– • Understanding indicators of Compromise, Attack, and Exposures (IoC, IoA, IoE)
– • Building threat intelligence capabilities
– • Establishing and monitoring log management
– • Implementing endpoint security
– • Configuring optimum firewall solutions
– • Understanding and using IDS/IPS technologies
– • Establishing Network Authentication, Authorization, Accounting (AAA)
• The candidate must have at least 2 years of work experience in the Information Security domain.
• Incident Response and Forensic Investigation
• Incident Response and Forensic Investigation
• Incident Response and Forensic Investigation
• Incident Response and Forensic Investigation
• Business Continuity and Disaster Recovery
• Business Continuity and Disaster Recovery
• Business Continuity and Disaster Recovery
• Business Continuity and Disaster Recovery
• Network Logs Monitoring and Analysis
• Network Logs Monitoring and Analysis
• Network Logs Monitoring and Analysis
• Network Logs Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Network Traffic Monitoring and Analysis
• Enterprise Virtual Network Security
• Enterprise Virtual Network Security
• Enterprise Virtual Network Security
• Enterprise Virtual Network Security
• Data Security
• Data Security
• Data Security
• Data Security
• Enterprise Wireless Network Security
• Enterprise Wireless Network Security
• Enterprise Wireless Network Security
• Enterprise Wireless Network Security
• Enterprise Cloud Network Security
• Enterprise Cloud Network Security
• Enterprise Cloud Network Security
• Enterprise Cloud Network Security
• Threat Prediction with Cyber Threat Intelligence
• Threat Prediction with Cyber Threat Intelligence
• Threat Prediction with Cyber Threat Intelligence
• Threat Prediction with Cyber Threat Intelligence
• Risk Anticipation with Risk Management
• Risk Anticipation with Risk Management
• Risk Anticipation with Risk Management
• Risk Anticipation with Risk Management
• Threat Assessment with Attack Surface Analysis
• Threat Assessment with Attack Surface Analysis
• Threat Assessment with Attack Surface Analysis
• Threat Assessment with Attack Surface Analysis
• Network Attacks and Defense Strategies
• Network Attacks and Defense Strategies
• Network Attacks and Defense Strategies
• Network Attacks and Defense Strategies
• Administrative Network Security
• Administrative Network Security
• Administrative Network Security
• Administrative Network Security
• Technical Network Security
• Technical Network Security
• Technical Network Security
• Technical Network Security
• Network Perimeter Security
• Network Perimeter Security
• Network Perimeter Security
• Network Perimeter Security
• Administrative Application Security
• Administrative Application Security
• Administrative Application Security
• Administrative Application Security
• Endpoint Security – Mobile Devices
• Endpoint Security – Mobile Devices
• Endpoint Security – Mobile Devices
• Endpoint Security – Mobile Devices
• Endpoint Security – IoT Devices
• Endpoint Security – IoT Devices
• Endpoint Security – IoT Devices
• Endpoint Security – IoT Devices
• Endpoint Security – Windows Systems
• Endpoint Security – Windows Systems
• Endpoint Security – Windows Systems
• Endpoint Security – Windows Systems
• Endpoint Security – Linux Systems
• Endpoint Security – Linux Systems
• Endpoint Security – Linux Systems
• Endpoint Security – Linux Systems
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.