Price
Duration
Delivery
Course Objectives:
– Gain an understanding of key concepts in cybersecurity, including information security and network security
– Identify information security threats, vulnerabilities, and attacks
– Explore the different types of malware
– Learn about identification, authentication, and authorization
– Understand network security controls and assessment techniques such as threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration, and asset management
– Study application security design and testing techniques
– Explore the fundamentals of virtualization, cloud computing, and cloud security
– Learn about wireless network fundamentals, wireless encryption, and related security measures
– Understand the fundamentals of mobile, IoT, and OT devices and related security measures
– Gain knowledge about cryptography and public-key infrastructure
– Learn data security controls, data backup and retention methods, and data loss prevention techniques
– Study network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic
– Understand the incident handling and response process
– Gain insights into computer forensics and digital evidence fundamentals, including the phases of a forensic investigation
– Explore concepts in business continuity and disaster recovery
– Understand risk management concepts, phases, and frameworks
Curriculum
- 1 Section
- 1 Lesson
- Lifetime
Requirements
- No specific requirement is necessary for this certification, although previous knowledge and experience in IT and networking with a focus on cybersecurity can be an advantage. Candidates should have a working knowledge of the use of computers and computer networks prior to entering this program.
Target audiences
- This course is for early-career IT professionals, IT managers, career changers, and career advancers, as well as students and recent graduates.