Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Explaining the Importance of Security Controls and Security Intelligence:
- Utilizing Threat Data and Intelligence:
- Analyzing Security Monitoring Data:
- Collecting and Querying Security Monitoring Data
- Utilizing Digital Forensics and Indicator Analysis Techniques:
- Applying Incident Response Procedures:
- Applying Risk Mitigation and Security Frameworks:
- Performing Vulnerability Management:
- Applying Security Solutions for Infrastructure Management:
- Understanding Data Privacy and Protection
- Applying Security Solutions for Software Assurance
- Applying Security Solutions for Cloud and Automation:
Requirements
Recommended Network+, Security+ or equivalent knowledge. Minimum of 4 years of hands-on experience in technical cybersecurity role
35 Hours
Testimonials (4)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
This topic is better with F2F, but this online training is still handled well . The important thing is the trainees were able to have understanding of Hyperledger Indy
OMAR BIN MUSA - UNITAR International University
Course - Blockchain: Hyperledger Indy for Identity Management
I genuinely enjoyed the great information and content.