Bots/Chatbots Getting Started with Information Security E-Learning Kurs
Getting Started with Information Security E-Learning Kurs
€165,85
Bots/Chatbots

Getting Started with Information Security E-Learning Kurs

EUR 165,85 exkl. MwSt.

Bestellen Sie diesen einzigartigen E-Learning-Kurs Erste Schritte mit der Informationssicherheit online, 1 Jahr rund um die Uhr Zugriff auf umfangreiche interaktive Videos, Fortschritte bei der Berichterstellung und beim Testen.

  • E-Learning - Online-Zugang: 365 Tage
  • Englische Sprache
  • Teilnahmeurkunde
Auf Lager
Menge
- +
Produktbeschreibung

Getting Started with Information Security E-Learning Ausbildung

Bestellen Sie diesen einzigartigen E-Learning-Kurs Erste Schritte mit Informations sicherheit online, 1 Jahr rund um die Uhr Zugriff auf umfangreiche interaktive Videos, Sprache, Fortschrittsüberwachung durch Berichte und Kapitelt zests, um das Wissen direkt.

Kursinhalt

Information Security: APT Defenses

Course: 1 Hour, 26 Minutes

Course Overview
Advanced Persistent Threat Introduction
APT Lifecycle
Motives and Targets of an APT
APT Defense Best Practices
Methods to Strengthen APT Defenses
Dealing with Advanced Persistent Threats
The Equation Group
Key Tools Used in APT
Dealing with Risks
Risk Assessment to Protect Assets
APT Checklists
Course Summary

Information Security: NACs & Gateways

Course: 38 Minutes

Course Overview
BYOD and IoT Security Risks
Challenges with BYOD
NAC and Its Importance
NAC Architecture
Features of NAC
Impact of Improperly Configured NAC
NAC Elements
Best Practices of Implementing NAC
NAC Security Checklist
NAC Authentication Methods
Course Summary

Information Security: Subnetting & DNS for Security Architects

Course: 1 Hour, 6 Minutes

Course Overview
Subnetting and its Advantages
The CIDR Notation
Tips and Tricks in Subnetting
VMs and Containers
Deployment Considerations for VMs and Containers
Best Practices for Deploying VMs
Best Practices for VM and Container Security
Types of DNS Attacks and their Mitigations
Types of Subnetting Attacks and Mitigations
Course Summary

Information Security: Securing Networking Protocols

Course: 57 Minutes

Course Overview
Common Protocols
Security Issues of TCP/IP Model
Threats, Vulnerabilities, and Mitigation
Weak Protocols and Their Replacements
Types of Security Protocols
Uses of Security Protocols
Importance of Security Protocols
The Security-First Mindset
Course Summary

Information Security: Hardened Security Topologies

Course: 43 Minutes

Course Overview
Security Topologies Introduction
Designing Goals for Security Topology
Advantages and Disadvantages of Security Topologies
Impact of Integrating Cloud Topologies
Layers of Security in Cloud Computing
Methods to Harden Security Topologies
Course Summary

Information Security: Continual Infrastructure Testing

Course: 44 Minutes

Course Overview
Continuous Security Practices Introduction
Continuous Security in DevOps Environment
Importance of Continuous Security
Benefits of Using DevOps
Continuous Security Monitoring
DevOps Security Best Practices
Secure DevOps Lifecycle
DevOps Security Risks
Tools for DevOps Testing
Course Summary

Information Security: Security Governance

Course: 1 Hour, 15 Minutes

Course Overview
Governance and Management Comparison
Types of IT Governance Frameworks
Senior Management Roles and Responsibilities
Ensuring Good IT Security Governance
Risks and Opportunities
Security Governance Program
Governance Framework Structure
Course Summary

Information Security: Honeypots

Course: 36 Minutes

Course Overview
Honeypot Introduction
Types of Honeypots
Role of Honeypots in Security
Disadvantages of a Honeypot
Honeypot Uses
Honeypot Deployment Strategies
Available Honeypot Products
Placement of Honeypot in a Network
Install and Configure a Honeypot
Honeypot Data Analysis
Course Summary

Information Security: Pen Testing

Course: 1 Hour, 35 Minutes

Course Overview
Pen Testing Process Introduction
Need for Pen Testing
Pen Testing and Vulnerability Assessment
Types of Pen Testing
Pen Testing Weaknesses
Types of Pen Testing Tools
Target Selection for Pen Testing
Threat Actors
Types of Assets
Types of Risk Responses
Metasploit Framework
MSFvenom
Course Summary

Eigenschaften
Unterrichtsdauer 9 Stunde
Sprache Englisch
Online-Zugang 365 Tage
Teilnahmeurkunde Ja
Preisgekröntes Online-Training Ja
Was unsere Kunden sagen

Durchschnitt von 0 Bewertungen

Kein Bewertungen
Lesen oder schreiben Sie einen Kommentar
* Wir werden Ihre E-Mail-Adresse niemals an Dritte weitergeben.
Fragen?
Wir helfen Ihnen gerne weiter. Bieten Sie unseren Kundenservice an
Mein Konto
You are not logged in. Log in to make use of all the benefits. Or create an account now.
Ihr Warenkorb
Ihr Warenkorb ist leer
Menu
Suchen
Search suggestions
Keine Produkte gefunden...
Wir benutzen Cookies nur für interne Zwecke um den Webshop zu verbessern. Ist das in Ordnung? Ja Nein Für weitere Informationen beachten Sie bitte unsere Datenschutzerklärung. »