This course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything that we cover within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to be a benefit to any company that is attempting to improve its security posture! With this certification, you will be marketable to any company, anywhere in the globe!
Student Testimonials
Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus.
Student
Excellent presentation skills, subject matter knowledge, and command of the environment.
Student
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect.
Student
Click here to print this page »
Prerequisites
Recommended minimum one-year of experience with server administration or network administration. General understanding of business processes is beneficial.
Detailed Class Syllabus
Module 1 – Introduction to IT Security
Understanding Security
Responsibilities
Building a Security Program
CIA Triad
Governance, Risk, Compliance
State of Security Today
Module 2 – Risk Management
Risk Management
Risk Assessment
Types of Risk, Threats and Vulnerabilities
Mitigating Attacks
Discovering Vulnerabilities and Threats
Responding to Risk
Module 3 – Understanding of Cryptography
Understanding Cryptography
Symmetric Encryption
Asymmetric Encryption
Hashing
PKI
Module 4 – Understanding Identity and Access Management
Identity Management
Authentication Techniques
Single Sign-on
Access Control Monitoring
Module 5 – Managing Data Security
Virtualization Principles
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
The Layers
Relevant CCM Controls
Module 6 – Data Security
Different Types of Storage
Encryption Options
Data Management
Module 7 – Managing Server/Host Security
The Operating Systems
Hardening the OS
Physical security
Virtualization and Cloud Technologies
Module 8 – Application Security for Non-Developers
Application Security Principle
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Patch/Update/Configuration Management
Module 9 – Understanding Mobile Device Security (IoT)
What Devices are we talking about?
What is the risk?
Hardening Mobile/IoT Devices
Corporate Management
Module 10 – Managing Day to Day Security
Company Responsibilities
Product Management
Business Continuity Basics
Incident Response
Why Train?
Module 11 – Understating Compliance and Auditing
Benefits of Compliance
Assurance Frameworks
What is Auditing