IT professionals need to be part of the cybersecurity ecosystem, especially in an era of digital transformation. If you think that cybersecurity is the responsibility of cyber teams alone, think again!
IT professionals need to be part of the cybersecurity ecosystem, especially in an era of digital transformation. If you think that cybersecurity is the responsibility of cyber teams alone, think again!
The Network Defender Certification was designed by industry experts to help IT professionals take an active role in protecting enterprise digital assets and detecting and responding to cyber threats, while leveraging network vigilance and research to predict threats before they occur. CND is a network security course designed to help organizations create and deploy the most comprehensive network defense system.
Training Aims
At the end of this training, the participant will be able to apply information protection processes in order to secure all types of networks present in their organization.
Target customers
Prerequisites
Training Architecture
Network attacks and defense strategies _ _ _
Administrative controls _ _ _ _ _ _ _ _ _ _ _
T e c h n i c controls
Network security perimeter .
Security of W i n d o w s systems
Security of Linux systems
Mobile device security.
Security of connected objects (IoT)
Application security.
Data security.
Security of virtual networks.
Cloud security.
Wireless Security:
Network traffic monitoring .
Analysis of network logs _ _ _
Incident Management and Investigations:
Business continuity and disaster management _ _ _ _ _
Risk management _ _ _ _ _
Analysis of threats and attack surfaces _ _ _
Management and prediction of threats
Since 1996, Technologia has been a training and skills development partner, enabling business leaders and managers to improve their performance, as well as that of their teams, through a wide variety of learner-centered training. We offer consulting and support services based on the company's business objectives.
Our main areas of training expertise cover:
Project management, transformation and operations
Leadership and talent management
Information Technology
Marketing and customer relations
Essential knowledge
Our mission
Support organizations in all sectors and their employees in developing their skills by offering them learning management consulting services as well as training adapted to their needs.
We firmly believe that competence is a strategic element directly linked to achieving business objectives and improving overall performance.
What We Aspire To:
Position ourselves as a leader, a strategic partner par excellence in Quebec, able to offer a global and integrated service in the field of corporate training. It is obvious to us that maintaining and developing skills is essential to the success of individuals and the performance of organizations.
This Is Why Technologia:
Advises and equips Quebec companies to promote the development of their skills and the achievement of desired performance levels
Supports individuals in updating their skills during the development of their careers.
ISACA’s Certified Information Security Manager (CISM) certification indicates expertise in information security governance, program development and management, incident management and risk management. Take your career out of the technical realm to management!
Cyber Bootcamp is an intensive 12-week program designed to kick-start your cybersecurity career. Intensive and immersive, this bootcamp takes a hybrid virtual approach, mixing live online classrooms and self-guided learning.
ISO/IEC 27032 Lead Cybersecurity Manager training enables you to acquire the expertise and competence needed to support an organization in implementing and managing a cybersecurity program based on the ISO/IEC 27032 and NIST Cybersecurity frameworks.
Configure different types of routers and switches to optimize and secure the company network. Optimize the operation of your network and prevent any external intrusion via your Cisco equipment.
Microsoft cloud security notably integrates Azure and Microsoft 365 solutions in SaaS, PaaS, and IaaS regimes. These are solutions that can maintain security at different levels, including data, but also network infrastructure, emails, and workstations.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy