During this course you will learn how to provide infrastructure, application, information, and operational security by identifying and mitigating risks.
Your course package is designed to provide maximum learning and convenience. This is included in the price of your course:
Your expert instructor will get you ready for the following exam and certification, which are included in your course package and covered by the Certification guarantee.
You´ll have the perfect starting point for your training with these prerequisites:
- An understanding of operating systems. knowledge of Windows based systems such as Windows 7 or XP would be preferred.
- The ability to identify basic network components and their roles, including routers, switches, firewalls and server roles.
- A basic understanding of the OSI Model and TCP/IP.
Using our engaging learning methodology including a variety of tools, we’ll cover the entire curriculum.
1.1 Implement security configuration parameters on network devices and other technologies.
1.2 Given a scenario, use secure network administration principles.
1.3 Explain network design elements and components.
1.4 Given a scenario, implement common protocols and services.
1.5 Given a scenario, troubleshoot security issues related to wireless networking.
Compliance and Operational Security
2.1 Explain the importance of risk related concepts.
2.2 Summarize the security implications of integrating systems and data with third parties.
2.3 Given a scenario, implement appropriate risk mitigation strategies.
2.4 Given a scenario, implement basic forensic procedures.
2.5 Summarize common incident response procedures.
2.6 Explain the importance of security related awareness and training.
2.7 Compare and contrast physical security and environmental controls.
2.8 Summarize risk management best practices.
2.9 Given a scenario, select the appropriate control to meet the goals of security.
Threats and Vulnerabilities
3.1 Explain types of malware.
3.2 Summarize various types of attacks.
3.3 Summarize social engineering attacks and the associated effectiveness with each attack.
3.4 Explain types of wireless attacks.
3.5 Explain types of application attacks.
3.6 Analyze a scenario and select the appropriate type of mitigation and deterrent techniques.
3.7 Given a scenario, use appropriate tools and techniques to discover security threats and vulnerabilities.
3.8 Explain the proper use of penetration testing versus vulnerability scanning.
Application, Data and Host Security
4.1 Explain the importance of application security controls and techniques.
4.2 Summarize mobile security concepts and technologies.
4.3 Given a scenario, select the appropriate solution to establish host security.
4.4 Implement the appropriate controls to ensure data security.
4.5 Compare and contrast alternative methods to mitigate security risks in static environments.
Access Control and Identity Management
5.1 Compare and contrast the function and purpose of authentication services.
5.2 Given a scenario, select the appropriate authentication, authorization or access control.
5.3 Install and configure security controls when performing account management, based on best practices.
6.1 Given a scenario, utilize general cryptography concepts.
6.2 Given a scenario, use appropriate cryptographic methods.
6.3 Given a scenario, use appropriate PKI, certificate management and associated components.
The Virtual Classroom is an online room, where you will join your instructor and fellow classmates in real time. Everything happens live and you can interact freely, discuss, ask questions, and watch your instructor present on a whiteboard, discuss the courseware and slides, work with labs, and review.
Yes, you can sit exams from all the major Vendors like Microsoft, Cisco etc from the comfort of your home or office.
With Readynez you do any course form the comfort of your home or office. Readynez provides support and best practices for your at-home classroom and you can enjoy learning with minimal impact on your day-to-day life. Plus you'll save the cost and the environmental burden of travelling.
Well, learning is limitless, when you are motivated, but you need the right path to achieve what you want. Readynez consultants have many years of experience customizing learner paths and we can design one for you too. We are always available with help and guidance, and you can reach us on the chat or write us at firstname.lastname@example.org.