You’ll be prepared to ensure the security, confidentiality, and integrity of all hardware, software, and data within an enterprise network environment following industry-standard security policies, procedures, and guidelines.
People Like You Purchased This Bundle
Full Course Description
Get ready to take your cybersecurity career to the next level with the advanced skills and tools you'll need to take even greater responsibility for the data and systems security for any organization. When you complete this training, you'll be able to demonstrate your skills to identify and manage vulnerabilities and security threats across multiple IT infrastructures and platforms.
Course Schedule
This course meets M-Th evenings for 5-hours of instruction (6-11 pm) over a 2 week period OR four consecutive Saturdays (8am-6pm) for a total of 40 hours of LIVE online instruction. Regularly scheduled breaks are included.
Your New Skill Set
Gain critical competencies to face-down real-world cybersecurity challenges and implement powerful solutions including comprehensive incident response and prevention systems; intrusion detection and analysis; network security management; digital forensics techniques; risk management and mitigation, and more.
High Level Skills You’ll Gain From This Training
Apply proactive threat intelligence to support organizational security and perform vulnerability management activities
Apply advanced security concepts in support of organizational risk mitigation and understand and implement recommended frameworks, policies, procedures, and controls
Apply security solutions consistent with NIST and other industry standards for infrastructure management and explaining software & hardware assurance best practices.
Apply the appropriate incident response procedures, analyze potential indicators of compromise, and utilize basic digital forensics techniques.
Additional Skills You’ll Build In This Course
Install and configure ManageEngine OpManager
Configure, verify and troubleshoot GRE Tunnel Connectivity
Advanced data storage and network security protocols
Security architecture
Using encryption and steganography
Implementing SSL VPN using ASA Device Manager
Performing digital forensics
Install and configure network load balancing
Compliance patching
Network mapping
Security engineering and cryptography skills
Performing security assessments using MBSA and other tools
Configuring two-factor authentication
Scanning and remediating vulnerabilities with OpenVAS
Securing mobile and embedded devices
Implementing AD Federation Services
Securing industrial computing environments
Wireshark network traffic analysis
Implementing DNSSEC
And more…