This course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything that we cover within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to be a benefit to any company that is attempting to improve its security posture! With this certification, you will be marketable to any company, anywhere in the globe!
Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus.
Excellent presentation skills, subject matter knowledge, and command of the environment.
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect.
Click here to print this page »
Recommended minimum one-year of experience with server administration or network administration. General understanding of business processes is beneficial.
Detailed Class Syllabus
Module 1 – Introduction to IT Security
Building a Security Program
Governance, Risk, Compliance
State of Security Today
Module 2 – Risk Management
Types of Risk, Threats and Vulnerabilities
Discovering Vulnerabilities and Threats
Responding to Risk
Module 3 – Understanding of Cryptography
Module 4 – Understanding Identity and Access Management
Access Control Monitoring
Module 5 – Managing Data Security
Key Components Mapped to Cloud Layer
Key Security Concerns
Other Technologies Used in the Cloud
Relevant CCM Controls
Module 6 – Data Security
Different Types of Storage
Module 7 – Managing Server/Host Security
The Operating Systems
Hardening the OS
Virtualization and Cloud Technologies
Module 8 – Application Security for Non-Developers
Application Security Principle
Software Development Life Cycle
OWASP Top 10
Hardening Web Applications
Module 9 – Understanding Mobile Device Security (IoT)
What Devices are we talking about?
What is the risk?
Hardening Mobile/IoT Devices
Module 10 – Managing Day to Day Security
Business Continuity Basics
Module 11 – Understating Compliance and Auditing
Benefits of Compliance
What is Auditing