Skills Gained
On course completion, you will be able to:
- Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions
- Monitor and secure hybrid environments, including cloud, mobile, and IoT
- Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance
- Identify, analyze, and respond to security events and incidents
Key Topics
Attacks, Threats and Vulnerabilities
- Compare and contrast different types of social engineering techniques
- Analyze potential indicators to determine the type of attack
- Explain different threat actors, vectors, and intelligence sources
- Explain security concerns associated with various types of vulnerabilities
- Summarize techniques used in security assessments
- Explain techniques used in penetration testing
Architecture and Design
- Explain importance of security concepts in an enterprise environment
- Summarize virtualization and cloud computing concepts, secure application development, deployment, and automation concepts
- Summarize authentication and authorization design concepts and the basics of cryptographic concepts
- Given a scenario, implement cybersecurity resilience
- Explain security implications of embedded and specialized systems and physical security controls
Implementation
- Given a scenario, implement secure protocols, host or application security solutions, and secure network designs
- Comprehend how to install and configure wireless security settings and how to apply cybersecurity solutions to the cloud
- Given a scenario, implement authentication and authorization solutions and identity and account management controls
- Understand implementing public key infrastructure (PKI)
Operations and Incident Response
- Given a scenario, use appropriate tool to assess organizational security
- Summarize importance of policies, processes, and procedures for incident response
- Given an incident, utilize appropriate data sources to support investigations
- Given an incident, apply mitigation techniques or controls to secure an environment
- Explain key aspects of digital forensics
Governance, Risk and Compliance
- Compare and contrast various types of controls
- Explain importance of applicable regulations, standards, or frameworks that impact organizational security posture
- Explain importance of policies to organizational security
- Summarize risk management processes and concepts
- Explain privacy and sensitive data concepts in relation to security
Prerequisites
Students should have basic Windows user skills and a fundamental understanding of computer and networking concepts. CompTIA A+ and Network+ is also recommended but not a requirement.