Course Outline
1. Access Controls Apply Logical Access Control in Terms of Subjects Apply Logical Access Controls in Terms of Objects of Object Groups  Implement Authentication Mechanisms  Operate Internetwork Trust Architectures Administer Identify Management Life Cycle  Implement Access Controls
2. Security Operations and Administration  Understand and Comply with Code of Ethics Understand Security Concepts
Document and Operate Security Controls Participate in Asset Management Implement and Assess Compliance with Controls  Participate in Change Management Duties  Participate in Security Awareness Training  Participate in Physical Security Operations
3. Risk Identification, Monitoring, and Analysis  Understand the Risk Management Process  Perform Security Assessment Activities  Operate and Maintain Monitoring Systems  Analyze and Report Monitoring Results
4. Incident Response and Recovery Participate in Incident Handling Understand and Support Forensics Investigations
Understand and Support Business Continuity (BCP) and Disaster Recovery Plan (DRP)
5. Cryptography  Understand and Apply Fundamental Concepts of Cryptography  Understand Requirements for Cryptography
Operate and Implement Cryptographic Systems
6. Networks and Communications Security  Understand Security Issues Related to Networks Protect Telecommunications Technologies  Control Network Access  Manage LAN-Based Security  Operate and Configure Network-Based Security Devices
Implement and Operate Wireless Technologies
7. Systems and Application Security Identify and Analyze Malicious Code and Activity  Implement and Operate Endpoint Device Security Operate and Configure Cloud Security Secure Big Data Systems  Operate and Secure Virtual Environments

  • 10 Days
  • 0 Units
  • 0 Hrs

Select Your Currency

WOOCS 1.1.8
Drop Us A Query
[contact-form-7 id="5639" title="Drop Us A Query"]
Create an Account