About this Course
This unit (comprising 2 sets of competencies) describes the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization.
This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics.
COURSE STRUCTURE
Security Fundamentals
- The Information Security Cycle
- Information Security Controls
- Authentication Methods
- Cryptography Fundamentals
- Security Policy Fundamentals
Identifying Security Threats And Vulnerabilities
- Social Engineering
- Malware
- Software-Based Threats
- Network-Based Threats
- Wireless Threats and Vulnerabilities
- Physical Threats and Vulnerabilities
Managing Data, Application, And Host Security
- Manage Data Security
- Manage Application Security
- Manage Device and Host Security
- Manage Mobile Security
Implementing Network Security
- Configure Security Parameters on Network Devices and Technologies
- Network design Elements and Components
- Implement Networking Protocols and Services
- Apply Secure Network Administration Principles
- Secure Wireless Traffic
Implementing Access Control, Authentication, And Account Management
- Access Control and Authentication Services
- Implement Account Management Security Controls
Managing Certificates
- Install a CA Hierarchy
- Enroll Certificates
- Secure Network Traffic by Using Certificates
- Renew Certificates
- Back-Up and Restore Certificates and Private Keys
- Revoke Certificates
Implementing Compliance And Operational Security
- Physical Security
- Legal Compliance
- Security Awareness and Training
- Integrate Systems and Data with Third Parties
Risk Management
- Risk Analysis
- Implement Vulnerability Assessment Tools and Techniques
- Scan for Vulnerabilities
- Mitigation and Deterrent Techniques
Troubleshooting And Managing Security Incidents
- Respond to Security Incidents
- Recover from a Security Incident
Business Continuity And Disaster Recovery Planning
- Business Continuity
- Plan for Disaster Recovery
- Execute DRPs and Procedures
TARGET AUDIENCE
Specialist (Technical)
Information Security Consultant; Security Administrator; Cloud Infrastructure Engineer; Senior Cloud Operations Engineer
Specialist (Technical)/Management
Senior Information Security Officer; Technical Support Engineer; Senior Cloud Operations Engineer
Entrant
Associate System Administrator
PRE-REQUISIT
Learners are assumed to already possess the following knowledge and skills:
- Basic Windows user skills (such as the opening and saving of files, navigating the Windows operating system and mouse usage).
- A fundamental understanding of computer and networking concepts.
- Six to nine months experience in networking, including configuring security parameters, are strongly recommended.
- Be able to speak, listen, read and write English at a proficiency level not lower than the Employability Skills Workforce Skills Qualification (ES WSQ) Workplace Literacy (WPL) Level 4.
- Be able to manipulate numbers at a proficiency level not lower than Employability Skills Workforce Skills Qualification (ES WSQ) Workplace Numeracy (WPN) Level 4
Course Rating
- /5 from users
Course Enquiry
Course Info
- Course Provider COMAT TRAINING SERVICES PTE LTD
- Course Category Technology
- Course Price n/a
Comments