Course Brief


In this course, you will implement, monitor, and troubleshoot infrastructure, application, information, and operational security.

You will:

  • Identify the fundamental concepts of computer security.

  • Identify security threats and vulnerabilities.

  • Manage data, application, and host security.

  • Implement network security.

  • Identify and implement access control and account management security measures.

  • Manage certificates.

  • Identify and implement compliance and operational security measures.

  • Manage risk.

  • Troubleshoot and manage security incidents.

  • Plan for business continuity and disaster recovery.


Course Contents


  • Security Fundamentals

  • Identifying Security Threats and Vulnerabilities

  • Managing Data, Application, and Host Security

  • Implementing Network Security

  • Implementing Access Control, Authentication, and Account Management

  • Managing Certificates

  • Implementing Compliance and Operational Security

  • Risk Management

  • Troubleshooting and Managing Security Incidents

  • Business Continuity and Disaster Recovery Planning


Target Audience


This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics; prepare for the CompTIA Security+ certification examination; or use Security+ as the foundation for advanced security certifications or career roles.

 

Modalities


  • The course is delivered On-Premise

  • The course will last 5 days  
     

Minimum Attendance

A minimum of 6 participants are required for the training.


Prerequisites


A+ certification or equivalent skills and knowledge is helpful but not mandatory.

 

Book Certification Training Courses from Ingram Micro



 


 
 
 

Copyright © 2018 Ingram Micro Cyber Security META. All rights reserved.