Course Summary

Organizations are continually targeted and as such they must be prepared for eventual compromise. Today, more than ever before, TIMELY detection and TIMELY response is critical. The longer an adversary is present in your environment, the more devastating and damaging the impact becomes. It could well be that the most important question in information security is: “How quickly can we detect, respond, and REMEDIATE an adversary?”

Information security is all about making sure you focus on the right areas of defense, especially as applied to the uniqueness of YOUR organization. In SEC401, you will learn the language and underlying workings of computer and information security, and how best to apply them to your unique needs. You will gain the essential and effective security knowledge you will need if you are given the responsibility to secure systems or organizations.

SEC401 will teach you the most effective steps to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. You will learn tips and tricks designed to help you win the battle against the wide range of cyber adversaries that want to harm your environment.

Access Control & Password Management
The candidate will understand the fundamental theory of access control and the role of passwords in managing access control.
Container and MacOS Security
The candidate will demonstrate an understanding of how to secure containers and understand security features provided in MacOS.
Cryptography
The candidate will have a basic understanding of the concepts of cryptography, including a high-level understanding of the major types of cryptosystems and steganography.
Cryptography Algorithms & Deployment
The candidate will have a basic understand of the mathematical concepts that contribute to cryptography and identify commonly used symmetric, asymmetric, and hashing cryptosystems.
Cryptography Application
The candidate will have a high-level understanding of the use, functionality, and operation of VPNs, GPG, and PKI
Data Loss Prevention and Mobile Device Security
The candidate will understand the risks and impacts of data loss, how to prevent it, and the security considerations.
Defense in Depth
The candidate will understand what defense in depth is and an identify the key areas of security and demonstrate the different strategies for implementing effective security within an organization.
Defensible Network Architecture
The candidate will demonstrate how to architect a network to be monitored and controlled to resist intrusion.
Endpoint Security
The candidate will demonstrate a basic understanding of the function and uses of endpoint security devices, such as endpoint firewalls, HIDS, and HIPS
Enforcing Windows Security Policy
The candidate will have a high-level understanding of the features of Group Policy and working with INF security templates
Incident Handling & Response
The candidate will understand the concepts of incident handling and the processes pertaining to incident handling.
Linux Fundamentals
The candidate will demonstrate an understanding of the Linux operating system structure, vulnerabilities, and permissions.
Linux Security and Hardening
The candidate will demonstrate an ability to gain visibility into a Linux system to be able to secure, audit, and harden the system.
Log Management & SIEM
The candidate will demonstrate a high-level understanding of the importance of logging, the setup and configuration of logging, and log analysis with the assistance of SIEMs
Malicious Code & Exploit Mitigation
The candidate will understand important attack methods and basic defensive strategies to mitigate those threats.
Network Security Devices
The candidate will demonstrate a basic understanding of the function and uses of network security devices, such as, firewalls, NIDS, and NIPS
Networking & Protocols
The candidate will demonstrate an understanding of the properties and functions of network protocols and network protocol stacks.
Security Frameworks and CIS Controls
The candidate will understand the purpose, implementation, and background of the CIS Critical Controls, NIST Cybersecurity Framework, and the MITRE ATT&CK knowledge base.
Virtualization and Cloud Security
The candidate will have a basic understanding of the risks of virtualization and cloud services and how to secure them.
Vulnerability Scanning and Penetration Testing
The candidate will demonstrate an understanding of the concepts and relationship behind reconnaissance, resource protection, risks, threats, and vulnerabilities including preliminary abilities to create network maps and perform penetration testing techniques
Web Communication Security
The candidate will demonstrate an understanding of web application security and common vulnerabilities including CGI, cookies, SSL and active content.
Windows Access Controls
The candidate will understand how permissions are applied in the Windows NT File System, Shared Folders, Printers, Registry Keys, and Active Directory, and how Privileges are applied
Windows as a Service
The candidate will understand how to manage updates for a network of Windows hosts.
Windows Automation, Auditing, and Forensics
The candidate will be introduced to the techniques and technologies used to audit Windows hosts.
Windows Security Infrastructure
The candidate will identify the differences between types of Windows OSes and how Windows manages groups and accounts, locally and with Active Directory and Group Policy
Windows Services and Microsoft Cloud
The candidate will know how to take basic measures in securing Windows network services such as IPsec, IIS, and Remote Desktop Services and Microsoft Azure security features.
Wireless Network Security
The candidate will have a basic understanding of the misconceptions and risks of wireless networks and how to secure them.

There are currently no prerequisites for this course.

proctored exam 106 questions Time limit of 4 hours Minimum passing score of 73%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?