Course Outline

  • Module 01: Network Attacks and Defense Strategies
  • Module 02: Administrative Network Security
  • Module 03: Technical Network Security
  • Module 04: Network Perimeter Security
  • Module 05: Endpoint Security-Windows Systems
  • Module 06: Endpoint Security-Linux Systems
  • Module 07: Endpoint Security- Mobile Devices
  • Module 08: Endpoint Security-IoT Devices
  • Module 09: Administrative Application Security
  • Module 10: Data Security
  • Module 11: Enterprise Virtual Network Security
  • Module 12: Enterprise Cloud Network Security
  • Module 13: Enterprise Wireless Network Security
  • Module 14: Network Traffic Monitoring and Analysis
  • Module 15: Network Logs Monitoring and Analysis
  • Module 16: Incident Response and Forensic Investigation
  • Module 17: Business Continuity and Disaster Recovery
  • Module 18: Risk Anticipation with Risk Management
  • Module 19: Threat Assessment with Attack Surface Analysis
  • Module 20: Threat Prediction with Cyber Threat Intelligence

Requirements

  • An understanding of ___
  • Experience with ___
  • ___ programming experience

Audience

  • ___
  • ___
  • ___
  35 Hours
 

Testimonials

Related Courses

BeyondCorp: Implementing Zero Trust Security

  14 hours

Certified Lead Ethical Hacker

  35 hours

Network Security

  14 hours

Zscaler

  14 hours

Cortex XDR

  21 hours

Palo Alto Networks Firewall Troubleshooting

  21 hours

Palo Alto Networks Firewall Essentials: Configuration and Management

  21 hours

Palo Alto Firewalls

  21 hours

Panorama: Managing Firewalls at Scale

  21 hours

System and Network Security with FortiGate

  21 hours

Network Security in Linux

  14 hours

Network Security Administrator

  35 hours

Penetration Testing with Nmap

  14 hours

OpenVAS

  14 hours

Wireless Network and Telecom Network Security

  35 hours