0 (0 Ratings)
What I will learn?
- Access control
- Security operations
- Risk management
- Cryptography
- Network security
- Application security
- Security testing
- Business continuity
Course Curriculum
Module 1: Access Control
-
Access Control Models (e.g., DAC, MAC, RBAC)
-
Authentication and Authorization Techniques
-
Identity and Access Management (IAM)
-
Multi-factor Authentication (MFA)
-
Privileged Access Management
-
Account Management and Auditing
Module 2: Security Operations and Administration
-
Security Operations Centers (SOC) and Their Role
-
Incident Response Procedures
-
Security Policies, Procedures, and Documentation
-
Security Automation and Orchestration
-
Auditing and Monitoring for Compliance
-
User and Group Management
Module 3: Risk Identification, Assessment, and Management
-
Risk Assessment Methodologies
-
Vulnerability Management and Threat Modeling
-
Risk Mitigation and Response Strategies
-
Risk Management Frameworks
-
Business Impact Analysis
-
Continuous Risk Monitoring
Module 4: Cryptography
-
Cryptographic Principles and Algorithms
-
Public Key Infrastructure (PKI)
-
Symmetric and Asymmetric Cryptography
-
Digital Signatures and Certificates
-
Data Encryption and Integrity Techniques
-
Cryptography in Communications
Module 5: Network and Communications Security
-
Network Security Architecture and Design
-
Firewalls, IDS/IPS, and VPNs
-
Network Protocols and Security Considerations
-
Securing Wireless Networks
-
Secure Email and Communication Protocols
-
Secure Remote Access
Module 6: Systems and Application Security
-
Operating System Security Hardening
-
Application Security Best Practices
-
Patch Management and Vulnerability Management
-
Secure Software Development Lifecycle (SDLC)
-
Database Security
-
Application Security Testing
Module 7: Security Assessment and Testing
-
Security Testing Techniques
-
Vulnerability Scanning and Penetration Testing
-
Security Auditing and Continuous Monitoring
-
Incident Response and Forensics
-
Testing for Compliance and Security Standards
-
Tools and Techniques for Security Assessment
Module 8 : Business Continuity and Disaster Recovery
-
Business Continuity Planning (BCP)
-
Disaster Recovery Planning (DRP)
-
Backup and Recovery Techniques
-
Crisis Management and Communication
-
Redundancy and High Availability
-
Testing and Validating Recovery Plans
Free
Free access this course
- LevelIntermediate
- Duration40 hours
Hi, Welcome back!