Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
- Understanding the Importance of Security Controls and Security Intelligence:
- Leveraging Threat Data and Intelligence:
- Analyzing Security Monitoring Data:
- Collecting and Querying Security Monitoring Data
- Applying Digital Forensics and Indicator Analysis Techniques:
- Implementing Incident Response Procedures:
- Applying Risk Mitigation and Security Frameworks:
- Conducting Vulnerability Management:
- Applying Security Solutions for Infrastructure Management:
- Understanding Data Privacy and Protection
- Applying Security Solutions for Software Assurance
- Applying Security Solutions for Cloud and Automation:
Requirements
Recommended knowledge of Network+, Security+, or equivalent. Minimum of 4 years of hands-on experience in a technical cybersecurity role.
35 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions