Ensuring the security and safety of networks and personal information is one of the most important things that users of computers and mobile and smart devices are looking for. Therefore, this course is considered an essential and important reference for you to ensure obtaining the necessary information and knowledge to identify security threats that may threaten your private network and strengthen security systems and infrastructure.
Availability: In Stock
Ensuring the security and safety of networks and personal information is one of the most important things that users of computers and mobile and smart devices are looking for. Therefore, this course is considered an essential and important reference for you to ensure obtaining the necessary information and knowledge to identify security threats that may threaten your private network and strengthen security systems and infrastructure.
The course prepares you to pass the CompTIA Security + exam. It includes a comprehensive definition of various topics in the field of computer and network security and protection. As well as the extent to which the field of network security relates to other areas of information technology.
Course outputs
• Identifying security threats to computer networks.
• Strengthening the internal systems and services in addition to the devices and services connected to the network.
• Ensure the security of communications in the network.
• Managing the infrastructure for secure business transactions.
• Learn how to enforce a computer and network security policy in the organization.
• Learn about security infrastructure control.
interlocutor
Introduction
Threats
Attacks
Threat actor types and attributes
• Penetration testing concepts
• The impact associated with types of vulnerabilities
• Technologies and Tools
• Software tools to assess security
Troubleshoot common security issues
• Architecture and Design
• The importance of secure staging deployment concepts
• The security implications of embedded systems
• Secure application development and dissemination of concepts
Cloud and virtualization concepts
• How resilience and automation strategies reduce risk
• The importance of physical security controls
• Identity and Access Management
• Install and configure identity and access services
Risk Management
Risk management processes and concepts
• Basic concepts of forensics
• Disaster recovery and continuity of operation concepts
• Data security and privacy practices
• Cryptography algorithms
Conclusion
مدة الدورة | 48 hours |
---|---|
التدريب المتوفر | Remote training, Training hall |