Cybersecurity Foundations

by Global Knowledge Claim Listing

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Global Knowledge Logo

img Duration

Enquire Now

Course Details

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.

 Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security.

You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

 

Who Should Attend?

  • Network professionals looking to advance their knowledge and explore cybersecurity as a career path

  • Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level

  • Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities

 

What You'll Learn

  • Increase your awareness of security

  • Interpret/analyze tool output for network mapping/footprinting

  • Reduce attack surface of systems

  • Review networking as it applies to security controls

  • Explore different data protection principles

  • Examine the role of PKI/certificates in building trusted relationships between devices in a network

  • Implement login security and other identity management solutions

  • Reduce attack surface of network devices

  • Explore current malware threats and anti-malware solutions

  • Explore social engineering threats, methods, and techniques

  • Examine software vulnerabilities and security solutions for reducing the risk of exploitation

  • Explain monitoring capabilities and requirements and how those may raise privacy concerns

  • Identify physical security controls and the relationship between physical and IT security

  • Explain incident response capabilities

  • Identify legal considerations and investigative techniques when it comes to cybersecurity

  • Research trends in cybersecurity

  • Raleigh Branch

    9000 Regency Parkway, Suite 100 Cary, Raleigh

Check out more Cybersecurity courses in USA

George Mason University Continuing & Professional Education Logo

Certified Information Security Manager (CISM)

The ISACA Certified Information Security Manager (CSIM) is the top credential for DC Metro area InfoSec professionals. This 100% online course will fully prepare you to take and pass the CISM certification exam.

by George Mason University Continuing & Professional Education [Claim Listing ]
San José State University Logo

Cyber Bootcamp

The San José State University Cyber Bootcamp is designed for students to pursue high-quality tech education while continuing to balance work or other commitments. Our program provides you with the flexibility to fit career development into your life.

by San José State University [Claim Listing ]
Vinsys Logo

Certified Information Security Manager (CISM) Certification Training

The CISM Certification Training Program at Vinsys ensures that you grasp the core theory and principles of Information Security strategy development and management along with Information Security Governance, and clear the CISM exam in your first attempt.

by Vinsys
Georgia Tech Professional Education Logo

Cybersecurity: A Systems Approach

As many business sectors become increasingly information centric and network reliant, cybersecurity is becoming a critical pillar of the enterprise. Cybersecurity: A Systems Approach explores information security vulnerabilities and how to approach cybersecurity resilience as a complex system.

by Georgia Tech Professional Education [Claim Listing ]
Nashville State Community College Logo

Information Security Technical Certificate

The Information Security Technical Certificate provides the security tools necessary to protect an organization’s resources. Learn to recognize compromised computer systems with a solid understanding of the methods employed by hackers.

by Nashville State Community College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy