In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.
In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution.
Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security.
You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.
Who Should Attend?
Network professionals looking to advance their knowledge and explore cybersecurity as a career path
Executives and managers looking to increase their ability to communicate with security professionals and implement a robust security solution at the organizational level
Individuals wants to improve their understanding of cybersecurity fundamentals, including threats, mitigating controls, and organizational responsibilities
What You'll Learn
Increase your awareness of security
Interpret/analyze tool output for network mapping/footprinting
Reduce attack surface of systems
Review networking as it applies to security controls
Explore different data protection principles
Examine the role of PKI/certificates in building trusted relationships between devices in a network
Implement login security and other identity management solutions
Reduce attack surface of network devices
Explore current malware threats and anti-malware solutions
Explore social engineering threats, methods, and techniques
Examine software vulnerabilities and security solutions for reducing the risk of exploitation
Explain monitoring capabilities and requirements and how those may raise privacy concerns
Identify physical security controls and the relationship between physical and IT security
Explain incident response capabilities
Identify legal considerations and investigative techniques when it comes to cybersecurity
Research trends in cybersecurity
Global Knowledge is a worldwide leader in IT and technology training, helping individuals and organizations build the skills they need to succeed in an ever-changing world.
With an international network of offices and training facilities, Global Knowledge has the unique flexibility to deliver a broad portfolio of courses on over 100 countries online, in classrooms, and through a worldwide partner network.
Established in 1995, Global Knowledge has over 1000 employees worldwide and enables the success of more than 200,000 tech professionals each year.
In June 2021, Global Knowledge merged with Skillsoft to create the world’s leading corporate learning company.
Global Knowledge Delivers What Technology And Business Process Can’t—skills.
Whether you realize it or not, skills are the key limiter to your success. Technology and process are crucial for accomplishing organizational objectives, but they’ve been democratized by the digital revolution.
The larger issue are the skill gaps hijacking your technology return on investments. As a result, organizations who are successfully using technology to accelerate success are also successfully transforming the capabilities of their people to maximize investments.
A Foundation In The Technology Community
Our contribution within the global technology community is more than just IT training. Technology’s expanding reach is making every level of staff some sort of technology professional.
The hyper-focused, specialty roles aren’t going anywhere—they’re more necessary than ever—but we also must account for the T-shaped skills. Thus, we train beyond the traditional IT topics and train more people than corporate IT.
We exist to address the total skills profile of technology professionals.
Whether you’re managing mission critical technology initiatives, developing your technical talent pipeline or taking IT products and services to market, our innovative and flexible learning solutions equip you for success.
Why Global Knowledge? Impact.
Sustainable, scalable, repeatable IMPACT—with minimal disruption. That’s why for over 20 years organizations large and small, technology providers, enterprises, and governments around the world come to us.
By providing access to subject matter experts, delivering authorized and industry-leading instruction through multiple delivery formats, we set the stage for your success by reducing skill gaps.
You’ll also see impacts in onboarding and employee retention through improved skills and higher job satisfaction.
This is all driven by the level of quality we set for ourselves. We believe in consistency and maintain rigorous in-house standards, so you receive an exceptional training experience anywhere in the world.
Only a dedicated learning organization specializing in more than one or two topics can deliver this level of impact—and we’re ready to provide it to you.
The ISACA Certified Information Security Manager (CSIM) is the top credential for DC Metro area InfoSec professionals. This 100% online course will fully prepare you to take and pass the CISM certification exam.
The San José State University Cyber Bootcamp is designed for students to pursue high-quality tech education while continuing to balance work or other commitments. Our program provides you with the flexibility to fit career development into your life.
The CISM Certification Training Program at Vinsys ensures that you grasp the core theory and principles of Information Security strategy development and management along with Information Security Governance, and clear the CISM exam in your first attempt.
As many business sectors become increasingly information centric and network reliant, cybersecurity is becoming a critical pillar of the enterprise. Cybersecurity: A Systems Approach explores information security vulnerabilities and how to approach cybersecurity resilience as a complex system.
The Information Security Technical Certificate provides the security tools necessary to protect an organization’s resources. Learn to recognize compromised computer systems with a solid understanding of the methods employed by hackers.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy