Course Objectives
By the end of the course, you should be able to meet the following objectives:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions. Monitor and secure hybrid environments, including cloud, mobile, Internet of Things (IoT), and operational technology. Operate with an awareness of applicable regulations and policies, including principles of governance, risk, and compliance. Identify, analyze, and respond to security events and incidents.
Agenda
- Security Concepts
- Security Controls
- Threat Actors
- Attack Surfaces
- Social Engineering
- Cryptographic Algorithms
- Public Key Infrastructure
- Cryptographic Solutions
- Authentication
- Authorization
- Identity Management
- Enterprise Network Architecture
- Network Security Appliances
- Secure Communications
- Cloud Infrastructure
- Embedded Systems and Zero Trust Architecture
- Asset Management
- Redundancy Strategies
- Physical Security
- Device and OS Vulnerabilities
- Application and Cloud Vulnerabilities
- Vulnerability Identification Methods
- Vulnerability Analysis and Remediation
- Network Security Baselines
- Network Security Capability Enhancement
- Implement Endpoint Security
- Mobile Device Hardening
- Application Protocol Security Baselines
- Cloud and Web Application Security Concepts
- Incident Response
- Digital Forensics
- Data Sources
- Alerting and Monitoring Tools
- Malware Attack Indicators
- Physical and Network Attack Indicators
- Application Attack Indicators
- Policies, Standards, and Procedures
- Change Management
- Automation and Orchestration
- Risk Management Processes and Concepts
- Vendor Management Concepts
- Audits and Assessments
- Data Classification and Compliance
- Personnel Policies
FREE
Interested in course?
Course Type: Instructor Led