Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Differentiating Security Roles and Controls
- Analyzing Threat Actors and Intelligence
- Conducting Security Assessments
- Recognizing Social Engineering and Malware
- Overview of Core Cryptographic Principles
- Deploying Public Key Infrastructure
- Deploying Authentication Controls
- Deploying Identity and Account Management Controls
- Deploying Secure Network Architectures
- Deploying Network Security Appliances
- Deploying Secure Network Protocols
- Deploying Host Security Solutions
- Deploying Secure Mobile Solutions
- Overview of Secure Application Principles
- Deploying Secure Cloud Solutions
- Clarifying Data Privacy and Protection Principles
- Executing Incident Response
- Clarifying Digital Forensics
- Overview of Risk Management Principles
- Enhancing Cybersecurity Resilience
- Clarifying Physical Security
Requirements
Participants should possess foundational Windows user proficiency along with a solid grasp of computing and networking fundamentals. Ideally, candidates will hold CompTIA A+ and Network+ certifications, combined with two years of IT administration experience centered on security.
35 Hours
Testimonials (1)
The knowledge of Dr. Mohammed.