Agenda
- Course Introduction
- Identify Information Security Concepts
- Identify Basic Security Controls
- Identify Basic Authentication and Authorization Concepts
- Identify Basic Cryptography Concepts
- Analyze Organizational Risk
- Analyze the Business Impact of Risk
- Identify Types of Attackers
- Identify Social Engineering Attacks
- Identify Malware
- Identify Software-Based Threats
- Identify Network-Based Threats
- Identify Wireless Threats
- Identify Physical Threats
- Identify Vulnerabilities
- Assess Vulnerabilities
- Implement Penetration Testing
- Implement Host Security
- Implement Cloud and Virtualization Security
- Implement Mobile Device Security
- Incorporate Security in the Software Development Lifecycle
- Configure Network Security Technologies
- Secure Network Design Elements
- Implement Secure Networking Protocols and Services
- Secure Wireless Traffic
- Implement Identity and Access Management
- Configure Directory Services
- Configure Access Services
- Manage Accounts
- Identify Advanced Cryptography Concepts
- Select Cryptographic Algorithms
- Configure a Public Key Infrastructure
- Enroll Certificates
- Back Up and Restore Certificates and Private Keys
- Revoke Certificates
- Evaluate Security Frameworks and Guidelines
- Incorporate Documentation in Operational Security
- Implement Security Strategies
- Manage Data Security Processes
- Implement Physical Controls
- Troubleshoot Common Security Issues
- Respond to Security Incidents
- Investigate Security Incidents
- Select Business Continuity and Disaster Recovery Processes
- Develop a Business Continuity Plan
FREE
Interested in course?
Course Type: Self Paced