In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
Current cyber threats and cybersecurity site references
Government-mandated directives and compliance requirements
Cyber roles required to successfully design secure systems
The attack cycle perpetrated by malicious hackers
Enterprise policy requirements
Best strategies for securing the enterprise with layered defenses
How security zones and detailed logging augment information assurance
Forensic challenges and incident response planning
Risk management process
Goals achievable with auditing, scanning, and testing systems
Industry recommendations for maintaining secure access control
Standards-based cryptographic solutions for securing communications
Who Can Benefit
Network professionals looking to advance their knowledge and explore cybersecurity as a career path.
Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level.
Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities.
https://www.exitcertified.com/training/specialized/network-security/cyber-security-foundations-6570-detail.html9701Cybersecurity Foundationshttps://assets.exitcertified.com/assets/CourseImages/03e54d7756/AdobeStock_214762721__FitMaxWzEwMDAsMTAwMF0.jpg3295.00USDInStock/Training/Specialized/Network & SecurityIn this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all...3295.00SpecializedClassroomGTRFeb 3, 2020 | VirtualFeb 17, 2020 | VirtualFeb 24, 2020 | Virtual2010-09-12T23:53:56+00:00USD