Course Outline

  • Explaining the Importance of Security Controls and Security Intelligence:
  • Utilizing Threat Data and Intelligence:
  • Analyzing Security Monitoring Data:
  • Collecting and Querying Security Monitoring Data
  • Utilizing Digital Forensics and Indicator Analysis Techniques:
  • Applying Incident Response Procedures:
  • Applying Risk Mitigation and Security Frameworks:
  • Performing Vulnerability Management:
  • Applying Security Solutions for Infrastructure Management:
  • Understanding Data Privacy and Protection
  • Applying Security Solutions for Software Assurance
  • Applying Security Solutions for Cloud and Automation:

Requirements

Recommended Network+, Security+ or equivalent knowledge. Minimum of 4 years of hands-on experience in technical cybersecurity role

 35 Hours

Number of participants



Price per participant

Testimonials (5)

Related Categories