Course Brief


In this course, you will:

  • Assess information security risk in computing and network environments.

  • Analyze the cybersecurity threat landscape.

  • Analyze reconnaissance threats to computing and network environments.

  • Analyze attacks on computing and network environments.

  • Analyze post-attack techniques on computing and network environments.

  • Evaluate the organization's security posture within a risk management framework.

  • Collect cybersecurity intelligence.

  • Analyze data collected from security and event logs.

  • Perform active analysis on assets and networks.

  • Respond to cybersecurity incidents.

  • Investigate cybersecurity incidents.


Course Contents


  • Assessing Information Security Risk

  • Analyzing the Threat Landscape

  • Analyzing Reconnaissance Threats to Computing and Network Environments

  • Analyzing Attacks on Computing and Network Environments

  • Analyzing Post-Attack Techniques

  • Evaluating the Organization’s Security Posture

  • Collecting Cybersecurity Intelligence

  • Analyzing Log Data

  • Performing Active Asset and Network Analysis


Target Audience


It is recommended that students have at least 2 years of experience in computer network security technology or a related field and have knowledge of: 

  • Network environments 

  • Routing and switching 

  • Common assurance safeguards (firewalls, intrusion prevention systems, VPN, etc.) 

  • Basic authentication and authorization 

  • Resource permissions and anti-malware mechanisms  
     

Modalities


  • The course is delivered On-Premise

  • The course will last 5 days  
     

Minimum Attendance

A minimum of 4 participants are required for the training.


Prerequisites


Intermediate to high levels of knowledge of and experience in computer network security and incident response will be an added advantage.

 

Book Certification Training Courses from Ingram Micro



 


 
 
 

Copyright © 2018 Ingram Micro Cyber Security META. All rights reserved.