![]() ![]() How to identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, configure the system to be more secure (realistic and practical application of a capable vulnerability management program).How to leverage the strengths and differences among the top three cloud providers (Amazon, Microsoft, and Google), including the concepts of multi-cloud.The Identity and Access Management (IAM) methodology, including aspects of strong authentication (Multi-Factor Authentication).How to leverage a defensible network architecture (VLANs, NAC, and 802.1x) based on advanced persistent threat indicators of compromise.What ransomware is and how to better defend against it.How adversaries adapt tactics and techniques, and importantly how to adapt your defense accordingly.Practical tips and tricks that focus on addressing high-priority security problems within your organization and doing the right things that lead to security solutions that work.The core areas of cybersecurity and how to create a security program that is built on a foundation of Detection, Response, and Prevention.You will learn (applied to on-premise and in the Cloud) SEC401 will also show you how to directly apply the concepts learned into a winning defensive strategy, all in the terms of the modern adversary. Whether you are new to information security or a seasoned practitioner with a specialized focus, SEC401 will provide the essential information security skills and techniques you need to protect and secure your critical information and technology assets, whether on-premise or in the cloud. You will gain the essential and effective security knowledge you will need if you are given the responsibility to secure systems or organizations. In SEC401, you will learn the language and underlying workings of computer and information security, and how best to apply them to your unique needs. ![]() Information security is all about making sure you focus on the right areas of defense, especially as applied to the uniqueness of YOUR organization. The most important question in information security may well be, "How quickly can we detect, respond, and REMEDIATE an adversary?" The longer an adversary is present in your environment, the more devastating and damaging the impact becomes. Today more than ever before, TIMELY detection and response is critical. Organizations are going to be targeted, so they must be prepared for eventual compromise. You will learn tips and tricks designed to help you win the battle against the wide range of cyber adversaries that want to harm your environment. This course will teach you the most effective steps to prevent attacks and detect adversaries with actionable techniques that can be used as soon as you get back to work. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |