Course Outline
Introduction to Security Operations and Administration
Fundamentals of Information Security
- Concepts of information security
- Security governance and policy
- Risk management
- Legal and compliance issues
Security Technologies and Controls
- Network security technologies
- Cryptography and access control mechanisms
- Endpoint security
- Cloud security fundamentals
Security Operations and Management
- Security Operations Center (SOC) fundamentals
- Incident response and management
- Security Information and Event Management (SIEM) tools
- Threat intelligence and analysis
Vulnerability Management and Penetration Testing
- Vulnerability assessment basics
- Penetration testing techniques
- Security auditing and reporting
Cybersecurity Frameworks and Best Practices
- Overview of common security frameworks
- Implementing security best practices
- Developing and maintaining security policies
Advanced Topics in Security Operations
- Advanced Persistent Threats (APT)
- IoT and mobile security challenges
- Emerging security technologies and trends
Leadership and Management in Security Operations
- Team leadership and management skills
- Communication and reporting in Security Operations
- Building and managing a security team
Summary and Next Steps
Requirements
- Basic understanding of security concepts
- Familiarity with networking concepts
Audience
- Security administrators
- Network administrators
Testimonials (4)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
I genuinely enjoyed the real examples of the trainer.