Cyber Security - NICF - Certified Security Analyst

  

About this Course

This unit (comprising 2 sets of competencies) describes the primary course you will need to take if your job responsibilities include securing network services, devices, and traffic in your organization.

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as Mac OS X®, Unix, or Linux; and who wants to further a career in IT by acquiring foundational knowledge of security topics.

COURSE STRUCTURE

Security Fundamentals

  • The Information Security Cycle
  • Information Security Controls
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

Identifying Security Threats And Vulnerabilities

  • Social Engineering
  • Malware
  • Software-Based Threats
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities

Managing Data, Application, And Host Security

  • Manage Data Security
  • Manage Application Security
  • Manage Device and Host Security
  • Manage Mobile Security

Implementing Network Security

  • Configure Security Parameters on Network Devices and Technologies
  • Network design Elements and Components
  • Implement Networking Protocols and Services
  • Apply Secure Network Administration Principles
  • Secure Wireless Traffic

Implementing Access Control, Authentication, And Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

Managing Certificates

  • Install a CA Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew Certificates
  • Back-Up and Restore Certificates and Private Keys
  • Revoke Certificates

Implementing Compliance And Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training
  • Integrate Systems and Data with Third Parties

Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

Troubleshooting And Managing Security Incidents

  • Respond to Security Incidents
  • Recover from a Security Incident

Business Continuity And Disaster Recovery Planning

  • Business Continuity
  • Plan for Disaster Recovery
  • Execute DRPs and Procedures

TARGET AUDIENCE

Specialist (Technical)

Information Security Consultant; Security Administrator; Cloud Infrastructure Engineer; Senior Cloud Operations Engineer

Specialist (Technical)/Management

Senior Information Security Officer; Technical Support Engineer; Senior Cloud Operations Engineer

Entrant

Associate System Administrator

PRE-REQUISIT

Learners are assumed to already possess the following knowledge and skills:

  • Basic Windows user skills (such as the opening and saving of files, navigating the Windows operating system and mouse usage).
  • A fundamental understanding of computer and networking concepts.
  • Six to nine months experience in networking, including configuring security parameters, are strongly recommended.
  • Be able to speak, listen, read and write English at a proficiency level not lower than the Employability Skills Workforce Skills Qualification (ES WSQ) Workplace Literacy (WPL) Level 4.
  • Be able to manipulate numbers at a proficiency level not lower than Employability Skills Workforce Skills Qualification (ES WSQ) Workplace Numeracy (WPN) Level 4

Rate this course:

Comments

Course Rating

  • /5 from users

Course Enquiry

Course Info

Other Similar Courses Provided By COMAT TRAINING SERVICES PTE LTD