Security - From Security Analyst To Security Architect Training
€1.208,79€999,00Incl. btwExcl. btw
Op voorraad
Award winning Security - From Security Analyst To Security Architect Training met toegang tot een online mentor via chats of e-mail, eindexamenbeoordeling en Practice Labs.
Lees meer.
Volume voordeel
No discount
1 Piece
€1.208,79€999,00
2% Korting
2 Pieces
€1.184,61€979,02/ Stuk
3% Korting
3 Pieces
€1.172,53€969,03/ Stuk
4% Korting
4 Pieces
€1.160,44€959,04/ Stuk
5% Korting
5 Pieces
€1.148,35€949,05/ Stuk
10% Korting
10 Pieces
€1.087,91€899,10/ Stuk
15% Korting
25 Pieces
€1.027,47€849,15/ Stuk
20% Korting
50 Pieces
€967,03€799,20/ Stuk
Maak een keuze
Officieel examen Online of fysiek
Start nu – bekroonde e-learning Inclusief proefexamens & 24/7
ISO 9001 & 27001 werkwijze 1000+ organisaties gingen u voor
Maatwerk & gratis intake Inclusief nulmeting bij training
Productomschrijving
Security - Security Analyst To Security Architect E-Learning Training
Nu er dagelijks nieuwe beveiligingsrisico's opduiken, is beveiliging een zeer belangrijk onderdeel van elke organisatie. In dit leertraject verkent u verschillende beveiligingsrollen die een grote rol spelen bij het veilig houden van organisaties. Diefstal van waardevolle gegevens analyseren, identificeren, beperken en voorkomen.
Dit leertraject, met meer dan 68 uur online content, is onderverdeeld in de volgende vier tracks:
Security Analyst Track 1: Security Analyst
Security Architect Track 2: Forensics Analyst
Security Architect Track 3: Vulnerability Analyst
Security Architect Track 4: Security Architect
Security Analyst Track 1: Security Analyst
In this Skillsoft Aspire track of the Security Architect journey, the focus will be on cybersecurity fundamentals, system security, and information security.
Demo Security - From Security Analyst To Security Architect Training
Cursusinhoud
E-learning courses
An Executive's Guide to Security: Understanding Security Threats
Course: 45 Minutes
Course Overview
Understanding the Attack Surface
Network Hardening Explained
What is a Demilitarized Zone?
Threats vs. Vulnerabilities vs. Risks
Top Security Threats
Types of Attacks
Physical Security
Social Engineering
The Importance of the Corporate Security Policy
Password Protection Policies
Why Never to Ask an Admin for Favors
Exercise: Describe Security Threats
An Executive's Guide to Security: Protecting Your Information
Course: 46 Minutes
Course Overview
Security on the Road
E-mail Security
How to Handle Sensitive Data
When and What to Share
BYOD and IoT
Wireless Networking Challenges
Posting on Social Media
The Importance of Security Programs
Employee Training, Awareness, and Advocacy
Balancing Up-Front Costs vs. Downtime in the Future
Convenience vs. Security
Exercise: Explain How to Protect Your Information
Cybersecurity 101: Session & Risk Management
Course: 1 Hour, 10 Minutes
Course Overview
Asset, Threats, and Vulnerabilities
Risk Management
Map Risks to Risk Treatments
User Account Management
Deploy User Account Security Settings
HTTP Session Management
Configure SSL and TLS Settings
Mobile Device Access Control
Data Confidentiality
Implement Encryption for Data in Motion
Implement Encryption for Data at Rest
Exercise: Session Management and Encryption
Cybersecurity 101: Auditing & Incident Response
Course: 1 Hour, 9 Minutes
Course Overview
Security Auditing and Accountability
Enable Windows File System Auditing
Conduct a Vulnerability Assessment Using Windows
Conduct a Vulnerability Assessment Using Linux
Mobile Device Access Control
Configure Mobile Device Hardening Policies
Enable a Smartphone as a Virtual MFA Device
Securing Applications
Implement File Hashing
Incident Response Planning
Examine Network Traffic for Security Incidents
Exercise: Auditing and Incident Response
Information Security: APT Defenses
Course: 1 Hour, 26 Minutes
Course Overview
Advanced Persistent Threat Introduction
APT Lifecycle
Motives and Targets of an APT
APT Defense Best Practices
Methods to Strengthen APT Defenses
Dealing with Advanced Persistent Threats
The Equation Group
Key Tools Used in APT
Dealing with Risks
Risk Assessment to Protect Assets
APT Checklists
Course Summary
Information Security: NACs & Gateways
Course: 38 Minutes
Course Overview
BYOD and IoT Security Risks
Challenges with BYOD
NAC and Its Importance
NAC Architecture
Features of NAC
Impact of Improperly Configured NAC
NAC Elements
Best Practices of Implementing NAC
NAC Security Checklist
NAC Authentication Methods
Course Summary
Information Security: Subnetting & DNS for Security Architects
Course: 1 Hour, 6 Minutes
Course Overview
Subnetting and its Advantages
The CIDR Notation
Tips and Tricks in Subnetting
VMs and Containers
Deployment Considerations for VMs and Containers
Best Practices for Deploying VMs
Best Practices for VM and Container Security
Types of DNS Attacks and their Mitigations
Types of Subnetting Attacks and Mitigations
Course Summary
Information Security: Securing Networking Protocols
Course: 57 Minutes
Course Overview
Common Protocols
Security Issues of TCP/IP Model
Threats, Vulnerabilities, and Mitigation
Weak Protocols and Their Replacements
Types of Security Protocols
Uses of Security Protocols
Importance of Security Protocols
The Security-First Mindset
Course Summary
Information Security: Hardened Security Topologies
Course: 43 Minutes
Course Overview
Security Topologies Introduction
Designing Goals for Security Topology
Advantages and Disadvantages of Security Topologies
Impact of Integrating Cloud Topologies
Layers of Security in Cloud Computing
Methods to Harden Security Topologies
Course Summary
Information Security: Continual Infrastructure Testing
Course: 44 Minutes
Course Overview
Continuous Security Practices Introduction
Continuous Security in DevOps Environment
Importance of Continuous Security
Benefits of Using DevOps
Continuous Security Monitoring
DevOps Security Best Practices
Secure DevOps Lifecycle
DevOps Security Risks
Tools for DevOps Testing
Course Summary
Information Security: Security Governance
Course: 1 Hour, 15 Minutes
Course Overview
Governance and Management Comparison
Types of IT Governance Frameworks
Senior Management Roles and Responsibilities
Ensuring Good IT Security Governance
Risks and Opportunities
Security Governance Program
Governance Framework Structure
Course Summary
Information Security: Honeypots
Course: 36 Minutes
Course Overview
Honeypot Introduction
Types of Honeypots
Role of Honeypots in Security
Disadvantages of a Honeypot
Honeypot Uses
Honeypot Deployment Strategies
Available Honeypot Products
Placement of Honeypot in a Network
Install and Configure a Honeypot
Honeypot Data Analysis
Course Summary
Information Security: Pen Testing
Course: 1 Hour, 35 Minutes
Course Overview
Pen Testing Process Introduction
Need for Pen Testing
Pen Testing and Vulnerability Assessment
Types of Pen Testing
Pen Testing Weaknesses
Types of Pen Testing Tools
Target Selection for Pen Testing
Threat Actors
Types of Assets
Types of Risk Responses
Metasploit Framework
MSFvenom
Course Summary
Online Mentor
You can reach your Mentor by entering chats or submitting an email.
Final Exam assessment
Estimated duration: 90 minutes
Practice Labs: Security Analyst (estimated duration: 8 hours)
Practice Security Analysts tasks such as using file hashing, file encryption, Wireshark and performing code reviews. Then, test your skills by answering assessment questions after installing and configuring LXD, using group policy, configuring a honeypot and exploring the Metasploit framework. This lab provides access to tools typically used by Security Analysts, including: o Kali Linux, Windows 10 and Windows Server 2019, PowerShell 5.1, Wireshark, Visual Studio Code
Security Architect Track 2: Forensics Analyst
In this Skillsoft Aspire track of the Security Architect journey, the focus will be on end-user awareness, anomaly detection, digital forensics, digital ethics & privacy, risk analysis, software assessment & audits, and cryptography. Content: E-learning courses
End-User Security: The End-User Perspective
Course: 54 Minutes
Course Overview
Concepts of Shared Responsibility
Acceptable Use Policies
Physical Security Controls
Authentication Technologies
Software and Hardware Updates
Personal Security Suites and Endpoint Protection
Web Browser Best Practices
E-mail Security Fundamentals
Cloud Security Issues
Protecting Data at Rest
Exercise: End-User Security
End-User Security: The Security Administrator Perspective
Course: 40 Minutes
Course Overview
The Present Threatscape
Written Security Policies
Security Training and Awareness
Access Switch and WAP Security
802.1X and MACsec
Endpoint Detection and Response
Next-Generation Endpoint Protection
Exercise: End-User Security
End-User Security: Securing End Users against Attackers
Course: 33 Minutes
Course Overview
Motives for Attacking Endpoints
Malware-as-a-Service (MaaS)
Phishing Techniques
Ransomware
Data Breach
Cryptojacking
Denial-of-Service
Survey of Common Exploit Kits
Exercise: End-User Security
Anomaly Detection: Aspects of Anomaly Detection
Course: 55 Minutes
Course Overview
Types of Anomalies
Benefits of Anomaly Detection
Traditional Approaches
Manual vs. Automated Detection
Baselining
Multimodal Attributes
Least Frequency of Occurrence
Machine Learning
Auto-periodicity Detection
Course Summary
Anomaly Detection: Network Anomaly Detection
Course: 1 Hour, 12 Minutes
Course Overview
Network Behavior Anomaly Detection
Frequency Analysis
Beaconing
Brute Force
Protocol Analysis
HTTPS Attacks
SSH Protocol Attacks
Population Analysis
Hidden Connection Using Behavior Analytics
Anomaly Detection Triage Methods
Network Anomaly Analysis Techniques
Mission Critical Areas
Course Summary
Digital Forensic Techniques & Investigative Approaches
Course: 58 Minutes
Course Overview
Digital Forensics Concepts
Types of Digital Forensics
Investigations
Digital Forensic Methodology
Chain of Custody
Evidence Handling
Forensic Laboratories and Tools
Legal
Cloud Forensics
Malware Forensics
Digital Forensics and Ethics
Live Forensics
Exercise: Applying Digital Forensic Best Practices
Digital Forensic Techniques & Investigative Approaches
Course: 58 Minutes
Course Overview
Digital Forensics Concepts
Types of Digital Forensics
Investigations
Digital Forensic Methodology
Chain of Custody
Evidence Handling
Forensic Laboratories and Tools
Legal
Cloud Forensics
Malware Forensics
Digital Forensics and Ethics
Live Forensics
Exercise: Applying Digital Forensic Best Practices
Ethics & Privacy: Digital Forensics
Course: 35 Minutes
Course Overview
Expectation of Privacy
Legal Authorization
Attorney-Client Privilege
Investigative Techniques
Ethics in Digital Forensics
Ethical Decision Making
Regulating Ethical Behavior
Conflict of Interest
Qualifications and Training
Analysis Standards
Course Summary
Risk Analysis: Security Risk Management
Course: 39 Minutes
Course Overview
Understanding Risk
Risk Management Concepts
Categorizing Risk
Selecting Security Controls
Implementing Security Controls
Assessing Security Controls
Examining Risk
Monitoring Controls
Control Focused Risk Management
Event Focused Risk Management
Risk Communication
Risk Response and Remediation
Course Summary
Privacy and Cookie PolicyTerms of Use
Cryptography: Introduction to Cryptography Services
Course: 57 Minutes
Course Overview
Goals of Information Security
Introducing Cryptography Services
Encryption Overview
Demo: Caesar Cipher
Introducing Symmetric Encryption
Symmetric Encryption Algorithms
Demo: Symmetric Encryption
Introducing Asymmetric Encryption
Asymmetric Encryption Algorithms
Introduction to Hashing
Common Hashing Algorithms
Demo: Hashing
Exercise: Encryption and Hashing
Cryptography: Introduction to PKI
Course: 1 Hour, 7 Minutes
Course Overview
Public Key Infrastructure Overview
Certificates
Demo: Certificate Properties
Certificate Authorities
Demo: Installing a CA
Digital Signatures
Secure Web Traffic with SSL
Demo: SSL Enable a Website
Certificate Revocation List
Demo: CRLs In Use
Exercise: Installing a CA & SSL Enabling a Website
Online Mentor
You can reach your Mentor by entering chats or submitting an email.
Final Exam assessment
Estimated duration: 90 minutes
Practice Labs: Forensics Analyst (estimated duration: 8 hours)
Practice Forensics Analyst tasks such as implementing web browser best practices, preventing brute force attacks, installing SIFT and detecting and removing keylogger software. Then, test your skills by answering assessment questions after auditing network security, applying Caesar cipher encryption techniques, implementing secure coding techniques and symmetric encryption.
Security Architect Track 3: Vulnerability Analyst
In this Skillsoft Aspire track of the Security Architect journey, the focus will be on vulnerability management, IDS/IPS, authentication, secure coding, tracking incidents, developing security topologies, and security architectures. Content: E-learning courses
You can reach your Mentor by entering chats or submitting an email.
Final Exam assessment
Estimated duration: 90 minutes
Practice Labs: Vulnerability Analyst (estimated duration: 8 hours)
Practice Vulnerability Analyst tasks such as performing local network scans, configuring Snort IDS, configuring and implementing intrusion detection, as well as configuring remote access with Secure Shell. Then, test your skills by answering assessment questions after cleaning input data, managing incidents, and configuring secure HTTPS and VPN services.
Security Architect Track 4: Security Architect
In this Skillsoft Aspire track of the Security Architect journey, the focus will be on rules of engagement, ethical hacking, intelligent security orchestration, regulatory mandates, breach notification process, triage automation, and unified security playbook. Content: E-learning courses
Security Rules: Rules of Engagement
Course: 48 Minutes
Course Overview
Rules of Engagement
Reference Checklist
Scope of Engagement
Client Considerations
Risks and Limitations
Logistics
Incident Handling
Testing
Information Handling
Reporting
Liabilities
Granting Authorization for Testing
Course Summary
Security Architect: Ethical Hacking Best Practices
Regulatory Mandates: Security Program Regulatory Integration
Course: 40 Minutes
Course Overview
Security and Regulations
Personally Identifiable Information
Payment Card Industry Data Security Standard
Health Insurance Portability and Accountability Act
General Data Protection Regulation
Gramm-Leach-Bliley Act
Federal Information Security Management Act
National Institute of Standard and Technology
International Organization for Standardization
Sarbanes-Oxley Act
Course Summary
Data Security Breach Notification Process
Course: 52 Minutes
Course Overview
Security Breach Notification Plan
Security Breach Notification Plan Best Practices
Security Breach Notification Stakeholders
Security Breach Categories
Digital Privacy Act Breach Notification
General Data Protection Regulation Breach Notification
HIPAA Breach Notification Requirements
Gramm Leach Bliley Act Breach Notification
HIPAA Breach Notification to Individuals
Breach Notification Noncompliance
Breach Notification Requirements
Security Breach Notification Risks
Course Summary
Security Incident Triage
Course: 52 Minutes
Course Overview
Security Triage Strategy
Security Triage Tools
Security Triage Automation
Security Triage Tips
Security Triage Stakeholders
Detecting Anomalies
Protocol Anomalies
Monitoring for Incidents
Analyzing for SSH Activity
Analyzing for DNS Activity
Analyzing for HTTPS Activity
Analyzing for Log Activity
Course Summary
Unified Security: Playbook Approach to Security
Course: 46 Minutes
Course Overview
Security Automation
Unified Playbook Approaches
Crafting a Unified Playbook
Security Transitions
Security Playbook Goals
Security Playbook Challenges
Security Playbook Tools
Ansible Playbooks
Executing a Playbook
Firewall Playbook
Server Protection Playbook
Automated Upgrades Playbook
Course Summary
Online Mentor
You can reach your Mentor by entering chats or submitting an email.
Final Exam assessment
Estimated duration: 90 minutes
Practice Labs: Security Architect (estimated duration: 8 hours)
Practice Security Architect tasks such as implementing testing best practices, executing Ansible playbooks, automating upgrades with playbooks, and analyzing SSH activity. Then, test your skills by answering
Specificaties
Artikelnummer
141381121
SKU
141381121
Taal
Engels
Kwalificaties van de Instructeur
Gecertificeerd
Cursusformaat en Lengte
Lesvideo's met ondertiteling, interactieve elementen en opdrachten en testen
Lesduur
68 uur
Assesments
De assessment test uw kennis en toepassingsvaardigheden van de onderwerpen uit het leertraject. Deze is 365 dagen beschikbaar na activering.
Online mentor
U heeft 24/7 toegang tot een online mentor voor al uw specifieke technische vragen over het studieonderwerp. De online mentor is 365 dagen beschikbaar na activering, afhankelijk van de gekozen Learning Kit.
Online Virtuele labs
Ontvang 12 maanden toegang tot virtuele labs die overeenkomen met de traditionele cursusconfiguratie. Actief voor 365 dagen na activering, beschikbaarheid varieert per Training.
Voortgangsbewaking
Toegang tot Materiaal
365 dagen
Technische Vereisten
Computer of mobiel apparaat, Stabiele internetverbindingen Webbrowserzoals Chrome, Firefox, Safari of Edge.
Support of Ondersteuning
Helpdesk en online kennisbank 24/7
Certificering
Certificaat van deelname in PDF formaat
Prijs en Kosten
Cursusprijs zonder extra kosten
Annuleringsbeleid en Geld-Terug-Garantie
Wij beoordelen dit per situatie
Award Winning E-learning
Tip!
Zorg voor een rustige leeromgeving, tijd en motivatie, audioapparatuur zoals een koptelefoon of luidsprekers voor audio, accountinformatie zoals inloggegevens voor toegang tot het e-learning platform.
Visio 2019 Bekroonde E-Learning cursus Uitgebreide interactieve video's met gesp...
€156,09€129,00
Specificaties
Artikelnummer
141381121
SKU
141381121
Taal
Engels
Kwalificaties van de Instructeur
Gecertificeerd
Cursusformaat en Lengte
Lesvideo's met ondertiteling, interactieve elementen en opdrachten en testen
Lesduur
68 uur
Assesments
De assessment test uw kennis en toepassingsvaardigheden van de onderwerpen uit het leertraject. Deze is 365 dagen beschikbaar na activering.
Online mentor
U heeft 24/7 toegang tot een online mentor voor al uw specifieke technische vragen over het studieonderwerp. De online mentor is 365 dagen beschikbaar na activering, afhankelijk van de gekozen Learning Kit.
Online Virtuele labs
Ontvang 12 maanden toegang tot virtuele labs die overeenkomen met de traditionele cursusconfiguratie. Actief voor 365 dagen na activering, beschikbaarheid varieert per Training.
Voortgangsbewaking
Toegang tot Materiaal
365 dagen
Technische Vereisten
Computer of mobiel apparaat, Stabiele internetverbindingen Webbrowserzoals Chrome, Firefox, Safari of Edge.
Support of Ondersteuning
Helpdesk en online kennisbank 24/7
Certificering
Certificaat van deelname in PDF formaat
Prijs en Kosten
Cursusprijs zonder extra kosten
Annuleringsbeleid en Geld-Terug-Garantie
Wij beoordelen dit per situatie
Award Winning E-learning
Tip!
Zorg voor een rustige leeromgeving, tijd en motivatie, audioapparatuur zoals een koptelefoon of luidsprekers voor audio, accountinformatie zoals inloggegevens voor toegang tot het e-learning platform.
Wij gebruiken functionele en analytische cookies om onze website goed te laten werken en het gebruik ervan te meten met Google Analytics. Er worden geen persoonsgegevens gedeeld voor advertentiedoeleinden. Door op "Accepteren" te klikken, geeft u toestemming voor het plaatsen van deze cookies.
Cookies beheren