In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.
Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security.
You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
Who Should Attend?
Network professionals looking to advance their knowledge and explore cybersecurity as a career path
Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level
Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities
What You'll Learn
Increase your awareness of security
Interpret/analyze tool output for network mapping/footprinting
Reduce attack surface of systems
Review networking as it applies to security controls
Explore different data protection principles
Examine the role of PKI/certificates in building trusted relationships between devices in a network
Implement login security and other identity management solutions
Reduce attack surface of network devices
Explore current malware threats and anti-malware solutions
Explore social engineering threats, methods, and techniques
Examine software vulnerabilities and security solutions for reducing the risk of exploitation
Explain monitoring capabilities and requirements and how those may raise privacy concerns
Identify physical security controls and the relationship between physical and IT security
Explain incident response capabilities
Identify legal considerations and investigative techniques when it comes to cybersecurity
Research trends in cybersecurity
Global Knowledge is a worldwide leader in IT and technology training, helping individuals and organizations build the skills they need to succeed in an ever-changing world.
With an international network of offices and training facilities, Global Knowledge has the unique flexibility to deliver a broad portfolio of courses on over 100 countries online, in classrooms, and through a worldwide partner network.
Established in 1995, Global Knowledge has over 1000 employees worldwide and enables the success of more than 200,000 tech professionals each year.
In June 2021, Global Knowledge merged with Skillsoft to create the world’s leading corporate learning company.
Global Knowledge Delivers What Technology And Business Process Can’t—skills.
Whether you realize it or not, skills are the key limiter to your success. Technology and process are crucial for accomplishing organizational objectives, but they’ve been democratized by the digital revolution.
The larger issue are the skill gaps hijacking your technology return on investments. As a result, organizations who are successfully using technology to accelerate success are also successfully transforming the capabilities of their people to maximize investments.
A Foundation In The Technology Community
Our contribution within the global technology community is more than just IT training. Technology’s expanding reach is making every level of staff some sort of technology professional.
The hyper-focused, specialty roles aren’t going anywhere—they’re more necessary than ever—but we also must account for the T-shaped skills. Thus, we train beyond the traditional IT topics and train more people than corporate IT.
We exist to address the total skills profile of technology professionals.
Whether you’re managing mission critical technology initiatives, developing your technical talent pipeline or taking IT products and services to market, our innovative and flexible learning solutions equip you for success.
Why Global Knowledge? Impact.
Sustainable, scalable, repeatable IMPACT—with minimal disruption. That’s why for over 20 years organizations large and small, technology providers, enterprises, and governments around the world come to us.
By providing access to subject matter experts, delivering authorized and industry-leading instruction through multiple delivery formats, we set the stage for your success by reducing skill gaps.
You’ll also see impacts in onboarding and employee retention through improved skills and higher job satisfaction.
This is all driven by the level of quality we set for ourselves. We believe in consistency and maintain rigorous in-house standards, so you receive an exceptional training experience anywhere in the world.
Only a dedicated learning organization specializing in more than one or two topics can deliver this level of impact—and we’re ready to provide it to you.
In our Cybersecurity cohort, you’ll learn the ins and outs of protecting your company’s network and sensitive data from attacks, damage and unauthorized access.
ISACA’s Certified Information Security Manager (CISM) certification is for those with technical expertise and experience in IS/IT security and control and wants to make the move from team player to manager.
This certification indicates expertise in information security governance, program development and management, incident management and risk management. If you are a mid-career IT professional aspiring to senior management roles in IT security and control, CISM can get you the visibility you need.
Upon completing this certificate, you will be prepared for the Network+ and Security+ certification exams. In this program, you will obtain the skills necessary to work in an entry-level position in information security and computer networking.
CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required for any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy