Course Summary

Organizations are constantly targeted by cyber adversaries, which makes it crucial for them to be prepared for potential security breaches. In today’s digital landscape, the ability to detect and respond to threats quickly is more important than ever. The longer an attacker is inside your network, the greater the potential damage. A key question in information security is: “How swiftly can we detect, respond to, and resolve a security breach?”

This course will guide you in identifying the most critical areas to defend, customized to meet the specific needs of your organization. You will learn the essential principles of computer and information security and how to effectively apply them to protect your systems and networks.

By the end of the course, you will have gained the knowledge and practical skills needed to prevent attacks and identify intruders. You will be equipped with actionable techniques that can be immediately implemented in your work. Additionally, the course will provide you with strategies to successfully combat a wide range of cyber threats, ultimately strengthening your organization’s overall security.

Access Control & Password Management
You will learn the fundamental principles of access control and how passwords play a crucial role in managing access within a secure environment.

Container and macOS Security
You will gain an understanding of how to secure containers and explore the security features available in macOS.

Cryptography
You will acquire a basic understanding of cryptography, including the major types of cryptosystems and steganography techniques.

Cryptography Algorithms & Deployment
You will learn about the mathematical principles behind cryptography and recognize commonly used symmetric, asymmetric, and hashing cryptosystems.

Cryptography Application
You will understand the use, functionality, and operation of technologies like VPNs, GPG, and Public Key Infrastructure (PKI).

Data Loss Prevention and Mobile Device Security
You will explore the risks and impacts of data loss, as well as strategies for preventing it, alongside key security considerations for mobile devices.

Defense in Depth
You will learn the concept of defense in depth, identify critical areas of security, and apply strategies to implement effective security across an organization.

Defensible Network Architecture
You will understand how to design and implement network architectures that can be monitored and controlled to resist intrusions.

Endpoint Security
You will develop a basic understanding of endpoint security devices, such as endpoint firewalls, Host Intrusion Detection Systems (HIDS), and Host Intrusion Prevention Systems (HIPS).

Enforcing Windows Security Policy
You will gain an overview of Windows security features, such as Group Policy and INF security templates, to enforce security policies effectively.

Incident Handling & Response
You will understand the principles of incident handling, including processes for responding to security incidents.

Linux Fundamentals
You will gain knowledge of the Linux operating system’s structure, including its vulnerabilities and permission settings.

Linux Security and Hardening
You will learn techniques to gain visibility into Linux systems, allowing you to secure, audit, and harden them.

Log Management & SIEM
You will explore the importance of logging, the setup and configuration of logs, and how to analyze logs using Security Information and Event Management (SIEM) systems.

Malicious Code & Exploit Mitigation
You will understand common attack methods and basic defensive strategies to mitigate these threats.

Network Security Devices
You will learn about the functions and uses of network security devices, such as firewalls, Network Intrusion Detection Systems (NIDS), and Network Intrusion Prevention Systems (NIPS).

Networking & Protocols
You will gain insight into the properties and functions of network protocols and protocol stacks.

Security Frameworks and CIS Controls
You will learn about the CIS Critical Controls, NIST Cybersecurity Framework, and MITRE ATT&CK knowledge base, including their implementation and purpose.

Virtualization and Cloud Security
You will understand the risks associated with virtualization and cloud services, as well as how to secure these environments.

Vulnerability Scanning and Penetration Testing
You will learn the relationship between reconnaissance, resource protection, risks, threats, and vulnerabilities, including the basics of network mapping and penetration testing techniques.

Web Communication Security
You will understand web application security and common vulnerabilities such as CGI, cookies, SSL, and active content.

Windows Access Controls
You will explore how permissions are applied in the Windows NT File System, Shared Folders, Printers, Registry Keys, and Active Directory, as well as how privileges are assigned.

Windows as a Service
You will learn how to manage updates across a network of Windows hosts.

Windows Automation, Auditing, and Forensics
You will be introduced to the techniques and technologies used to audit and investigate Windows hosts.

Windows Security Infrastructure
You will understand the differences between Windows operating systems and how Windows manages user groups, accounts, Active Directory, and Group Policy.

Windows Services and Microsoft Cloud
You will learn how to secure Windows network services, including IPsec, IIS, Remote Desktop Services, and Microsoft Azure security features.

Wireless Network Security
You will gain an understanding of the misconceptions and risks associated with wireless networks, along with best practices for securing them.

There are no prerequisites for this course

proctored exam 106 questions Time limit of 4 hours Minimum passing score of 73%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?