Get in Touch

Course Outline

  • Differentiating Security Roles and Controls
  • Analyzing Threat Actors and Intelligence
  • Conducting Security Assessments
  • Recognizing Social Engineering and Malware
  • Overview of Core Cryptographic Principles
  • Deploying Public Key Infrastructure
  • Deploying Authentication Controls
  • Deploying Identity and Account Management Controls
  • Deploying Secure Network Architectures
  • Deploying Network Security Appliances
  • Deploying Secure Network Protocols
  • Deploying Host Security Solutions
  • Deploying Secure Mobile Solutions
  • Overview of Secure Application Principles
  • Deploying Secure Cloud Solutions
  • Clarifying Data Privacy and Protection Principles
  • Executing Incident Response
  • Clarifying Digital Forensics
  • Overview of Risk Management Principles
  • Enhancing Cybersecurity Resilience
  • Clarifying Physical Security

Requirements

Participants should possess foundational Windows user proficiency along with a solid grasp of computing and networking fundamentals. Ideally, candidates will hold CompTIA A+ and Network+ certifications, combined with two years of IT administration experience centered on security.

 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories