This course introduces various topics in the field of computer and network security and protection, as well as the extent to which the field of network security relates to other areas in information technology.
This course also provides the information and knowledge necessary to prepare for further trainers related to specialized security fields, in addition to a general introduction to this field. Upon completion of the course, he will be expected to be able to identify security threats to computer networks, strengthen internal systems and services, as well as network connectivity devices and services, ensure the security of network communications, manage infrastructure for secure business transactions, and enforce an organizations computer and network security policy. , as well as monitoring the security infrastructure.
Course Duration : 30 Hours
Course Outline
Module 01: Comparing Security Roles and Security Controls
Module 02: Explaining Threat Actors and Threat Intelligence
Module 03: Performing Security Assessments
Module 04: Identifying Social Engineering and Malware
Module 05: Summarizing Basic Cryptographic Concepts
Module 06: Implementing Public Key Infrastructure
Module 07: Implementing Authentication Controls
Module 08: Implementing Identity and Account Management Controls
Module 09: Implementing Secure Network Designs
Module 10: Implementing Network Security Appliances
Module 11: Implementing Secure Network Protocols
Module 12: Implementing Host Security Solutions
Module 13:Implementing Secure Mobile Solutions
Module 14: Summarizing Secure Application Concepts
Module 15: Implementing Secure Cloud Solutions
Module 16: Explaining Data Privacy and Protection Concepts
Module 17: Performing Incident Response
Module 18: Explaining Digital Forensics
Module 19: Summarizing Risk Management Concepts
Module 20: Implementing Cyber security Resilience
Module 21: Explaining Physical Security