Menu
EUR
Nu 10% korting op alle Microsoft-certificeringen! Bekijk aanbod
Getting Started with Information Security Training
€192,39 €159,00
In shopping cart
Getting Started with Information Security Training
(0)
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training
Getting Started with Information Security Training

Getting Started with Information Security Training

€192,39 €159,00 Incl. tax Excl. tax
In stock

Order this unique E-Learning Training Getting Started with Information Security online, 1 year 24/7 access to rich interactive videos, progress through reporting and testing. Read more.

Bulk discount
No discount
1 Piece
€192,39 €159,00
2% Discount
2 Pieces
€188,54 €155,82 / Piece
3% Discount
3 Pieces
€186,62 €154,23 / Piece
4% Discount
4 Pieces
€184,69 €152,64 / Piece
5% Discount
5 Pieces
€182,77 €151,05 / Piece
10% Discount
10 Pieces
€173,15 €143,10 / Piece
15% Discount
25 Pieces
€163,53 €135,15 / Piece
20% Discount
50 Pieces
€153,91 €127,20 / Piece
Make a choice
standaardprijs
117996385
In stock
Ordered before 5 p.m.! Start today.
117996385
€192,39 €159,00
  • Officieel examen
    Online of fysiek
  • Start nu – bekroonde e-learning
    Inclusief proefexamens & 24/7
  • ISO 9001 & 27001 werkwijze
    1000+ organisaties gingen u voor
  • Maatwerk & gratis intake
    Inclusief nulmeting bij training

Product description

Getting Started with Information Security E-Learning

Order this unique E-Learning course today!
✔️ 1 year 24/7 access to interactive videos, voice and progress monitoring through reports.
✔️ Direct tests per chapter to immediately test and strengthen your knowledge.

Why choose this course?

In today's digital world, information security is essential for organizations and individuals to protect data from threats such as cyber attacks and data breaches. This course provides a comprehensive introduction to information security, helping you learn the fundamentals of the field and understand why it is so important.

What you will learn:

  • The Basics of Information Security: Learn the core concepts and principles that form the backbone of effective security.
  • Risk analysis and management: Understand how to identify, assess and manage risks to keep data safe.
  • Cyber ​​threats and countermeasures: Understand the types of cyber threats and how to combat them.
  • Security Policies and Procedures: Learn how to create and implement effective security policies.
  • Compliance and regulations: Discover how information security relates to laws and regulations, such as GDPR and ISO 27001.

Who should participate?

This course is suitable for:

  • IT professionals who want to expand their knowledge of information security.
  • Business leaders and managers who want to understand and manage the risks of cyber threats.
  • Beginners in IT security who want to build a solid foundation in the field.
  • Students and job seekers who want to start a career in cybersecurity.
  • Anyone interested in learning information security concepts.

Course content

Information Security: APT Defenses

Course: 1 Hour, 26 Minutes

  • Course Overview
  • Advanced Persistent Threat Introduction
  • APT Lifecycle
  • Motives and Targets of an APT
  • APT Defense Best Practices
  • Methods to Strengthen APT Defenses
  • Dealing with Advanced Persistent Threats
  • The Equation Group
  • Key Tools Used in APT
  • Dealing with Risks
  • Risk Assessment to Protect Assets
  • APT Checklists
  • Course Summary

Information Security: NACs & Gateways

Course: 38 Minutes

  • Course Overview
  • BYOD and IoT Security Risks
  • Challenges with BYOD
  • NAC and Its Importance
  • NAC Architecture
  • Features of NAC
  • Impact of Improperly Configured NAC
  • NAC Elements
  • Best Practices of Implementing NAC
  • NAC Security Checklist
  • NAC Authentication Methods
  • Course Summary

Information Security: Subnetting & DNS for Security Architects

Course: 1 Hour, 6 Minutes

  • Course Overview
  • Subnetting and its Advantages
  • The CIDR Notation
  • Tips and Tricks in Subnetting
  • VMs and Containers
  • Deployment Considerations for VMs and Containers
  • Best Practices for Deploying VMs
  • Best Practices for VM and Container Security
  • Types of DNS Attacks and their Mitigations
  • Types of Subnetting Attacks and Mitigations
  • Course Summary

Information Security: Securing Networking Protocols

Course: 57 Minutes

  • Course Overview
  • Common Protocols
  • Security Issues of TCP/IP Model
  • Threats, Vulnerabilities, and Mitigation
  • Weak Protocols and Their Replacements
  • Types of Security Protocols
  • Uses of Security Protocols
  • Importance of Security Protocols
  • The Security-First Mindset
  • Course Summary

Information Security: Hardened Security Topologies

Course: 43 Minutes

  • Course Overview
  • Security Topologies Introduction
  • Designing Goals for Security Topology
  • Advantages and Disadvantages of Security Topologies
  • Impact of Integrating Cloud Topologies
  • Layers of Security in Cloud Computing
  • Methods to Harden Security Topologies
  • Course Summary

Information Security: Continual Infrastructure Testing

Course: 44 Minutes

  • Course Overview
  • Continuous Security Practices Introduction
  • Continuous Security in DevOps Environment
  • Importance of Continuous Security
  • Benefits of Using DevOps
  • Continuous Security Monitoring
  • DevOps Security Best Practices
  • Secure DevOps Lifecycle
  • DevOps Security Risks
  • Tools for DevOps Testing
  • Course Summary

Information Security: Security Governance

Course: 1 Hour, 15 Minutes

  • Course Overview
  • Governance and Management Comparison
  • Types of IT Governance Frameworks
  • Senior Management Roles and Responsibilities
  • Ensuring Good IT Security Governance
  • Risks and Opportunities
  • Security Governance Program
  • Governance Framework Structure
  • Course Summary

Information Security: Honeypots

Course: 36 Minutes

  • Course Overview
  • Honeypot Introduction
  • Types of Honeypots
  • Role of Honeypots in Security
  • Disadvantages of a Honeypot
  • Honeypot Uses
  • Honeypot Deployment Strategies
  • Available Honeypot Products
  • Placement of Honeypot in a Network
  • Install and Configure a Honeypot
  • Honeypot Data Analysis
  • Course Summary

Information Security: Pen Testing

Course: 1 Hour, 35 Minutes

  • Course Overview
  • Pen Testing Process Introduction
  • Need for Pen Testing
  • Pen Testing and Vulnerability Assessment
  • Types of Pen Testing
  • Pen Testing Weaknesses
  • Types of Pen Testing Tools
  • Target Selection for Pen Testing
  • Threat Actors
  • Types of Assets
  • Types of Risk Responses
  • Metasploit Framework
  • MSFvenom
  • Course Summary

Get started today!

✔️ Access anytime, anywhere to learn at your own pace.
✔️ Tests per chapter to track your progress and immediately test what you have learned.
✔️ Progress reports to gain insight into your learning progress.

Order your course now and start your journey in information security today!

Specifications

Article number
117996385
SKU
117996385
Language
English
Qualifications of the Instructor
Certified
Course Format and Length
Teaching videos with subtitles, interactive elements and assignments and tests
Lesson duration
9 Hours
Progress monitoring
Access to Material
365 days
Technical Requirements
Computer or mobile device, Stable internet connections Web browsersuch as Chrome, Firefox, Safari or Edge.
Support or Assistance
Helpdesk and online knowledge base 24/7
Certification
Certificate of participation in PDF format
Price and costs
Course price at no extra cost
Cancellation policy and money-back guarantee
We assess this on a case-by-case basis
Award Winning E-learning
Tip!
Provide a quiet learning environment, time and motivation, audio equipment such as headphones or speakers for audio, account information such as login details to access the e-learning platform.

Reviews

0/5
0 stars based on 0 reviews
0 reviews
Vragen over deze training?
Of wilt u hulp bij het bestellen? Neem gerust contact op via [email protected] of bel ons op +31 36 760 1019. Wij helpen u graag!
Vragen over deze training?
Of wilt u hulp bij het bestellen? Neem gerust contact op via [email protected] of bel ons op +31 36 760 1019. Wij helpen u graag!

Recently viewed

Online 24/7
Getting Started with Information Security Training
Getting Started with Information Security Training
Order this unique E-Learning Training Getting Started with Information Security ...
€192,39 €159,00
 
LearnKit
5G Technologies and Practices Training
5G Technologies and Practices Training
5G Technologies and Practices E-Learning Training Gecertificeerde docenten Quizz...
€239,58 €198,00
 

Specifications

Article number
117996385
SKU
117996385
Language
English
Qualifications of the Instructor
Certified
Course Format and Length
Teaching videos with subtitles, interactive elements and assignments and tests
Lesson duration
9 Hours
Progress monitoring
Access to Material
365 days
Technical Requirements
Computer or mobile device, Stable internet connections Web browsersuch as Chrome, Firefox, Safari or Edge.
Support or Assistance
Helpdesk and online knowledge base 24/7
Certification
Certificate of participation in PDF format
Price and costs
Course price at no extra cost
Cancellation policy and money-back guarantee
We assess this on a case-by-case basis
Award Winning E-learning
Tip!
Provide a quiet learning environment, time and motivation, audio equipment such as headphones or speakers for audio, account information such as login details to access the e-learning platform.
0/5
0 stars based on 0 reviews
0 reviews
Choose your language
Choose your currency

Recently added

Total excl. VAT
€0,00
Order for another €50,00 and receive free shipping
0
Compare
Start comparison

Review Getting Started with Information Security Training

This product has been added to your cart
Wij gebruiken functionele en analytische cookies om onze website goed te laten werken en het gebruik ervan te meten met Google Analytics. Er worden geen persoonsgegevens gedeeld voor advertentiedoeleinden. Door op "Accepteren" te klikken, geeft u toestemming voor het plaatsen van deze cookies. Manage cookies