Getting Started with Information Security E-Learning Kurs





Getting Started with Information Security E-Learning Kurs
Bestellen Sie diesen einzigartigen E-Learning-Kurs Erste Schritte mit der Informationssicherheit online, 1 Jahr rund um die Uhr Zugriff auf umfangreiche interaktive Videos, Fortschritte bei der Berichterstellung und beim Testen.
Lesen Sie mehr- Marke:
- Bots/Chatbots
- Verfügbarkeit:
- Auf Lager
- Award Winning E-learning
- Tiefpreisgarantie
- Persönlicher Service durch unser Expertenteam
- Sicher online oder per Rechnung bezahlen
- Bestellung und Start innerhalb von 24 Stunden
Getting Started with Information Security E-Learning Ausbildung
Bestellen Sie diesen einzigartigen E-Learning-Kurs Erste Schritte mit Informations sicherheit online, 1 Jahr rund um die Uhr Zugriff auf umfangreiche interaktive Videos, Sprache, Fortschrittsüberwachung durch Berichte und Kapitelt zests, um das Wissen direkt.
Kursinhalt
Information Security: APT Defenses
Course: 1 Hour, 26 Minutes
- Course Overview
- Advanced Persistent Threat Introduction
- APT Lifecycle
- Motives and Targets of an APT
- APT Defense Best Practices
- Methods to Strengthen APT Defenses
- Dealing with Advanced Persistent Threats
- The Equation Group
- Key Tools Used in APT
- Dealing with Risks
- Risk Assessment to Protect Assets
- APT Checklists
- Course Summary
Information Security: NACs & Gateways
Course: 38 Minutes
- Course Overview
- BYOD and IoT Security Risks
- Challenges with BYOD
- NAC and Its Importance
- NAC Architecture
- Features of NAC
- Impact of Improperly Configured NAC
- NAC Elements
- Best Practices of Implementing NAC
- NAC Security Checklist
- NAC Authentication Methods
- Course Summary
Information Security: Subnetting & DNS for Security Architects
Course: 1 Hour, 6 Minutes
- Course Overview
- Subnetting and its Advantages
- The CIDR Notation
- Tips and Tricks in Subnetting
- VMs and Containers
- Deployment Considerations for VMs and Containers
- Best Practices for Deploying VMs
- Best Practices for VM and Container Security
- Types of DNS Attacks and their Mitigations
- Types of Subnetting Attacks and Mitigations
- Course Summary
Information Security: Securing Networking Protocols
Course: 57 Minutes
- Course Overview
- Common Protocols
- Security Issues of TCP/IP Model
- Threats, Vulnerabilities, and Mitigation
- Weak Protocols and Their Replacements
- Types of Security Protocols
- Uses of Security Protocols
- Importance of Security Protocols
- The Security-First Mindset
- Course Summary
Information Security: Hardened Security Topologies
Course: 43 Minutes
- Course Overview
- Security Topologies Introduction
- Designing Goals for Security Topology
- Advantages and Disadvantages of Security Topologies
- Impact of Integrating Cloud Topologies
- Layers of Security in Cloud Computing
- Methods to Harden Security Topologies
- Course Summary
Information Security: Continual Infrastructure Testing
Course: 44 Minutes
- Course Overview
- Continuous Security Practices Introduction
- Continuous Security in DevOps Environment
- Importance of Continuous Security
- Benefits of Using DevOps
- Continuous Security Monitoring
- DevOps Security Best Practices
- Secure DevOps Lifecycle
- DevOps Security Risks
- Tools for DevOps Testing
- Course Summary
Information Security: Security Governance
Course: 1 Hour, 15 Minutes
- Course Overview
- Governance and Management Comparison
- Types of IT Governance Frameworks
- Senior Management Roles and Responsibilities
- Ensuring Good IT Security Governance
- Risks and Opportunities
- Security Governance Program
- Governance Framework Structure
- Course Summary
Information Security: Honeypots
Course: 36 Minutes
- Course Overview
- Honeypot Introduction
- Types of Honeypots
- Role of Honeypots in Security
- Disadvantages of a Honeypot
- Honeypot Uses
- Honeypot Deployment Strategies
- Available Honeypot Products
- Placement of Honeypot in a Network
- Install and Configure a Honeypot
- Honeypot Data Analysis
- Course Summary
Information Security: Pen Testing
Course: 1 Hour, 35 Minutes
- Course Overview
- Pen Testing Process Introduction
- Need for Pen Testing
- Pen Testing and Vulnerability Assessment
- Types of Pen Testing
- Pen Testing Weaknesses
- Types of Pen Testing Tools
- Target Selection for Pen Testing
- Threat Actors
- Types of Assets
- Types of Risk Responses
- Metasploit Framework
- MSFvenom
- Course Summary
Unterrichtsdauer | 9 Stunde |
---|---|
Sprache | Englisch |
Online-Zugang | 365 Tage |
Teilnahmeurkunde | Ja |
Preisgekröntes Online-Training | Ja |
Es wurden noch keine Bewertungen für dieses Produkt abgegeben.
Bewertungen
Es wurden noch keine Bewertungen für dieses Produkt abgegeben.
Microsoft Office SCORM e-Learning
Möchten Sie Microsoft Office E-Learning SCORM in das LMS Ihrer Organisation integrieren? Nehmen Sie Kontakt mit uns auf.