Course Outline
By the end of this course, you will learn:
- CIA (Confidentiality, Integrity, and Availability) triad of information security which is an information security benchmark model used to evaluate the information security of an organization.
- Hackers Tools, Techniques and Exploits
- Implementing and Auditing Key Security Controls
- Intrusion Detection in depth
- Continuous Monitoring and Security Operations
- Incident Handling
- Cloud Security Architecture and Operations
- Penetration Testing and Ethical Hacking Overview
Course Severity – Basic
Course Duration – Approximately 35 Hours (4 weekends)
Curriculum
- 8 Sections
- 0 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Security Basics0
- HackersTools, Techniques and Exploits0
- Intrusion Detection0
- Cybersecurity Attacks and Countermeasures0
- Implementing and Auditing Critical Security Controls0
- Continuous Monitoring and Security Operations0
- Cloud Security Architecture and Operations0
- Mobile Device Security0