This course provides the basic knowledge needed to analyze, monitor, and protect cybersecurity resources in a vendor-neutral format. It includes threat intelligence, vulnerability management, network reconnaissance and monitoring, secure policies and procedures, host and network security, identity management systems, and incident response.
How you’ll benefit This class will help you:
Learn how to analyze, monitor, and protect critical infrastructures using threat-detection and threat-analysis tools.
Why Attend with Current Technologies CLC
Our Instructors are in the top 10%
Our Lab has a dedicated 1 Gig Fiber Connection for our Labs
The job roles best suited to the material in this course are:
This course is designed for IT professionals such as PC, desktop, and help desk technicians who have experience supporting PC hardware who wish to make the transition to become server hardware and support specialists.
To fully benefit from this course, you should have the following knowledge:
Knowledge equivalent to the CompTIA Security+ certification
At least two years (recommended) of experience in computer network security technology or a related field.
The ability to recognize information security vulnerabilities and threats in the context of risk management.
Foundation-level operational skills with some of the common operating systems for computing environments.
Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
Foundational knowledge of major TCP/IP networking protocols including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.