Course Brief
In this course, you will:
-
Assess information security risk in computing and network environments.
-
Analyze the cybersecurity threat landscape.
-
Analyze reconnaissance threats to computing and network environments.
-
Analyze attacks on computing and network environments.
-
Analyze post-attack techniques on computing and network environments.
-
Evaluate the organization's security posture within a risk management framework.
-
Collect cybersecurity intelligence.
-
Analyze data collected from security and event logs.
-
Perform active analysis on assets and networks.
-
Respond to cybersecurity incidents.
-
Investigate cybersecurity incidents.
Course Contents
-
Assessing Information Security Risk
-
Analyzing the Threat Landscape
-
Analyzing Reconnaissance Threats to Computing and Network Environments
-
Analyzing Attacks on Computing and Network Environments
-
Analyzing Post-Attack Techniques
-
Evaluating the Organization’s Security Posture
-
Collecting Cybersecurity Intelligence
-
Analyzing Log Data
-
Performing Active Asset and Network Analysis
Target Audience
It is recommended that students have at least 2 years of experience in computer network security technology or a related field and have knowledge of:
-
Network environments
-
Routing and switching
-
Common assurance safeguards (firewalls, intrusion prevention systems, VPN, etc.)
-
Basic authentication and authorization
-
Resource permissions and anti-malware mechanisms
Modalities
Minimum Attendance
A minimum of 4 participants are required for the training.
Prerequisites
Intermediate to high levels of knowledge of and experience in computer network security and incident response will be an added advantage.
Book Certification Training Courses from Ingram Micro