Price:
$3,695.00
Days:
1
Virtual
– • Planning and administering network security for organizations
– • Recognizing security risks, threats, and vulnerabilities
– • Ensuring compliance with regulatory standards
– • Designing and implementing network security policies
– • Applying security principles in distributed and mobile computing environments
– • Implementing Identity and Access Management, encryption, and network segmentation
– • Managing Windows and Linux Security Administration
– • Addressing security risks in mobile devices and IoT
– • Implementing strong data security techniques
– • Managing security in virtualization technologies and cloud platforms
– • Implementing wireless network security
– • Conducting risk and vulnerability assessments
– • Providing first response to security incidents
– • Identifying Indicators of Compromise and Attack
– • Integrating threat intelligence for proactive defense
– • Conducting Attack Surface Analysis
– • Assisting in Business Continuity and Disaster Recovery planning
– • Monitoring network traffic and performing log management
– • Managing proxy, content filtering, and troubleshooting network issues
– • Hardening security of endpoints and selecting firewall solutions
– • Configuring IDS/IPS for enhanced security
– • Maintaining an inventory of network devices
– • Providing security awareness guidance and training
– • Managing AAA for network devices
– • Reviewing audit logs and analyzing security anomalies
– • Maintaining and configuring security platforms
– • Evaluating security products and operations procedures
– • Identifying and classifying organizational assets
– • Implementing system integrity monitoring tools
– • Understanding EDR/XDR and UEBA solutions
– • Conducting PIA processes for privacy assessment
– • Collaborating on threat hunting and incident response
– • Understanding SOAR platforms in cybersecurity operations
– • Integrating Zero Trust principles into security architectures
– • Staying updated on emerging cyber threats
– • Understanding the role of AI/ML in cyber defense
• The candidate must have at least 2 years of work experience in the Information Security domain.
• Network Attacks and Defense Strategies
• Administrative Network Security
• Technical Network Security
• Network Perimeter Security
• Endpoint Security – Windows Systems
• Endpoint Security – Linux Systems
• Endpoint Security – Mobile Devices
• Endpoint Security – IoT Devices
• Administrative Application Security
• Data Security
• Enterprise Virtual Network Security
• Enterprise Cloud Network Security
• Enterprise Wireless Network Security
• Network Traffic Monitoring and Analysis
• Network Logs Monitoring and Analysis
• Incident Response and Forensic Investigation
• Business Continuity and Disaster Recovery
• Risk Anticipation with Risk Management
• Threat Assessment with Attack Surface Analysis
• Threat Prediction with Cyber Threat Intelligence
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.