In Class & Live, Online Training(Cyber Security)

£2,295.00

Category:

Description

In Class & Live, Online Training(Cyber Security)

You will learn how to:

  • In network environments, assess the security threats.
  • Detect harmful actions using computing systems effectively.
  • Examine post-attack strategies and apply abilities to reply proactively.
  • Evaluate the dangers and vulnerabilities to perform examination and decide the scope in an immersive hands-on environment.
  • Viably secure basic data frameworks some time recentlyamid, and after an assault.
  • Prepare for evaluations by gathering cybersecurity intelligence.
  • Develop the abilities you’ll need to reduce the time between when a breach happens and when it’s discovered.

Who Should Participate:

  • Paragon Cyber Security Certification is planned for experts who want, or are required, to  protect critical information systems.
  • You must have 3-5 years of experience working in an IT environment and familiarity with administration, networks, systems.

Topics Covered:

  • Categorize Threats and Threat Profiles
  • Perform Ongoing Threat Research
  • Determine the importance of risk management
  • Evaluate Risk
  • Alleviate Risk
  • Merge Documentation into Risk Management
  • Execute Threat Modelling
  • Evaluate the Impact of Reconnaissance
  • Evaluate the Impact of Social Engineering
  • Evaluate the Impact of System Hacking Attacks
  • Evaluate the Impact of Web-Based Attacks
  • Evaluate the Impact of Malware
  • Evaluate the Impact of Hijacking and Impersonation Attacks
  • Evaluate the Impact of DoS Incidents
  • Evaluate the Impact of Threats to Mobile Security
  • Evaluate the Impact of Threats to Cloud Security
  • Evaluate Command and Control Techniques
  • Evaluate Persistence Techniques
  • Evaluate Lateral Movement and Pivoting Techniques
  • Evaluate Data Exfiltration Techniques
  • Evaluate Anti-Forensics Techniques
  • Execute a Vulnerability Management Plan
  • Evaluate Common Vulnerabilities
  • Manage Vulnerability Scans
  • Manage Penetration Tests on Network Assets
  • Investigate on Penetration Testing
  • Examine Incidents with Windows-Based Tools
  • Examine Incidents with Linux-Based Tools
  • Examine Malware
  • Examine Indicators of Compromise
  • Establish a Security Intelligence Collection and Analysis Platform
  • Gather Data from Network-Based Intelligence Sources
  • Gather Data from Host-Based Intelligence Sources
  • Use Common Tools to Examine Logs
  • Use SIEM Tools for Analysis
  • Deploy an Incident Handling and Response Architecture
  • Contain and Mitigate Incidents
  • Prepare for Forensic Investigation as a CSIRT
  • Register a Forensic Investigation Plan
  • Securely Gather and Examine Electronic Evidence
  • Research on the Results of an Investigation

Frequently asked questions: Can I take this course online? Yes

Reviews

There are no reviews yet.

Be the first to review “In Class & Live, Online Training(Cyber Security)”

Your email address will not be published.