Introductie
Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network.In this cybersecurity course, you will gain a global perspective of the challenges of designing aOmschrijving
Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network.In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.1. Cybersecurity AwarenessWhat is security?Confidentiality, integrity, and availabilitySecurity baseliningSecurity concerns: HumansTypes of threatsSecurity controlsWhat is hacking?Risk managementData in motion vs. data at restModule review2. Network DiscoveryNetworking reviewDiscovery, footprinting, and scanningCommon vulnerabilities and exposuresSecurity policiesVulnerabilitiesModule review3. Systems HardeningWhat isDoelgroep(en)
Network professionals looking to advance their knowledge and explore cybersecurity as a career pathExecutives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational levelIndividuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilitiesInhoud
Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network.In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.Leerdoel(en)
Increase your awareness of securityInterpret/analyze tool output for network mapping/footprintingReduce attack surface of systemsReview networking as it applies to security controlsExplore different data protection principlesExamine the role of PKI/certificates in building trusted relationships between devices in a networkImplement login security and other identity management solutionsReduce attack surface of network devicesExplore current malware threats and anti-malware solutionsExplore social engineering threats, methods, and techniquesExamine software vulnerabilities and security solutions for reducing the risk of exploitationExplain monitoring capabilities and requirements and how those may raise privacy concernsIdentify physical security controls and the relationship between physical and IT securityExplain incident response capabilitiesIdentify legal considerations and investigative techniques when it comes to cybersecurityResearch trends in cybersecurity