De Meest Voordelige Opleider van Nederland
Award winning E-Learning & Gecertificeerde Trainers
Upgrade uw cv met een certificaat van deelname van OEM
SpringestMicrosoft PartnerEC-CouncilOfferte Aanvragen
0

Tip: we verzorgen onze trainingen tegenwoordig ook VirtueelTip: we verzorgen onze trainingen tegenwoordig ook VirtueelKlik hier voor meer informatie

Tip: we verzorgen onze trainingen tegenwoordig ook VirtueelTip: we verzorgen onze trainingen tegenwoordig ook VirtueelKlik hier voor meer informatie

Bots /Chatbots Getting Started with Information Security E-Learning

Productomschrijving
Getting Started with Information Security E-Learning Training Bestel deze unieke E-Learning cursus Getting Started with Information Security online, 1 jaar 24/ 7 toegang tot rijke interactieve video’s, spraak, voortgangsbewaking door rapportages en testen per hoofdstuk om de kennis direct te toetsen. Cursusinhoud Information Security: APT Defe...

Getting Started with Information Security E-Learning Training

Bestel deze unieke E-Learning cursus Getting Started with Information Security online, 1 jaar 24/ 7 toegang tot rijke interactieve video’s, spraak, voortgangsbewaking door rapportages en testen per hoofdstuk om de kennis direct te toetsen.


Cursusinhoud

Information Security: APT Defenses

Course: 1 Hour, 26 Minutes

Course Overview
Advanced Persistent Threat Introduction
APT Lifecycle
Motives and Targets of an APT
APT Defense Best Practices
Methods to Strengthen APT Defenses
Dealing with Advanced Persistent Threats
The Equation Group
Key Tools Used in APT
Dealing with Risks
Risk Assessment to Protect Assets
APT Checklists
Course Summary

Information Security: NACs & Gateways

Course: 38 Minutes

Course Overview
BYOD and IoT Security Risks
Challenges with BYOD
NAC and Its Importance
NAC Architecture
Features of NAC
Impact of Improperly Configured NAC
NAC Elements
Best Practices of Implementing NAC
NAC Security Checklist
NAC Authentication Methods
Course Summary

Information Security: Subnetting & DNS for Security Architects

Course: 1 Hour, 6 Minutes

Course Overview
Subnetting and its Advantages
The CIDR Notation
Tips and Tricks in Subnetting
VMs and Containers
Deployment Considerations for VMs and Containers
Best Practices for Deploying VMs
Best Practices for VM and Container Security
Types of DNS Attacks and their Mitigations
Types of Subnetting Attacks and Mitigations
Course Summary

Information Security: Securing Networking Protocols

Course: 57 Minutes

Course Overview
Common Protocols
Security Issues of TCP/IP Model
Threats, Vulnerabilities, and Mitigation
Weak Protocols and Their Replacements
Types of Security Protocols
Uses of Security Protocols
Importance of Security Protocols
The Security-First Mindset
Course Summary

Information Security: Hardened Security Topologies

Course: 43 Minutes

Course Overview
Security Topologies Introduction
Designing Goals for Security Topology
Advantages and Disadvantages of Security Topologies
Impact of Integrating Cloud Topologies
Layers of Security in Cloud Computing
Methods to Harden Security Topologies
Course Summary

Information Security: Continual Infrastructure Testing

Course: 44 Minutes

Course Overview
Continuous Security Practices Introduction
Continuous Security in DevOps Environment
Importance of Continuous Security
Benefits of Using DevOps
Continuous Security Monitoring
DevOps Security Best Practices
Secure DevOps Lifecycle
DevOps Security Risks
Tools for DevOps Testing
Course Summary

Information Security: Security Governance

Course: 1 Hour, 15 Minutes

Course Overview
Governance and Management Comparison
Types of IT Governance Frameworks
Senior Management Roles and Responsibilities
Ensuring Good IT Security Governance
Risks and Opportunities
Security Governance Program
Governance Framework Structure
Course Summary

Information Security: Honeypots

Course: 36 Minutes

Course Overview
Honeypot Introduction
Types of Honeypots
Role of Honeypots in Security
Disadvantages of a Honeypot
Honeypot Uses
Honeypot Deployment Strategies
Available Honeypot Products
Placement of Honeypot in a Network
Install and Configure a Honeypot
Honeypot Data Analysis
Course Summary

Information Security: Pen Testing

Course: 1 Hour, 35 Minutes

Course Overview
Pen Testing Process Introduction
Need for Pen Testing
Pen Testing and Vulnerability Assessment
Types of Pen Testing
Pen Testing Weaknesses
Types of Pen Testing Tools
Target Selection for Pen Testing
Threat Actors
Types of Assets
Types of Risk Responses
Metasploit Framework
MSFvenom
Course Summary

Productspecificaties

Duur
9 uur
Taal
Engels
Certificaat van deelname
Ja
Online toegang
365 dagen

Beoordelingen

0 / 5Based on 0 reviews

Er zijn nog geen reviews geschreven over dit product..

Schrijf je eigen review

Eerder bekeken door jou

Bots /Chatbots Getting Started with Information Security E-Learning
Bots /ChatbotsGetting Started with Information Security E-Learning

Bestel deze unieke E-Learning cursus Getting Started with Information Security online, 1 jaar 24/ 7 toegang tot rijke interactieve video’s, voortgangs door rapportage en testen.

€159,00 Excl. btw
Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? JaNeeMeer over cookies »