Identify
In this section, we will identify the attacks and vulnerabilities that need to be mitigated before they infiltrate information systems.
This course focuses on providing real-life job skills for an Cybersecurity Engineer/Analyst..
Cybersecurity engineers, sometimes called information security engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime. The below section details more specific topics covered in this course.
ㅤ
Contact UsIn this section, we will identify the attacks and vulnerabilities that need to be mitigated before they infiltrate information systems.
In this section, we will secure operating systems, applications, and understand how we can automate these tasks using powershell.
In this section we will identify and implement the best protocols and encryption for an enterprise environment.
In this section, you will learn and understand the importance of compliance and their role in Security.
We will be covering procedures on understanding organizational security and incident response assessments which include topics such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.
Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.
Deploying an Security Information and Event Manager and Intrusion Detection System onto the cloud.