Course Details
Home - Course Details
CyberSys
Description
Course Outline
- Introduction
- Indentigy security control types
- Threat intelligence sharing
- Classifying threats
- Threat hunting
- Network forensics
- Appliance monitoring
- Endpoint monitoring
- Email monitoring
- Configuration your SIEM
- Analyzing your SIEM
- Digital forensics
- Analyzing network IOCs
- Analyzing host-related IOCs
- Analyzing lateral Movement and pivoting IOCs
- Incident response preparation
- Detection and containment
- Containment, eradication, recovery, and post-incident actions
- Risk mitigation
- Frameworks, policies, and procedures
- Enumeration tools
- Vulnerability scanning
- Analyzing output from vulnerability scanners
- Mitigating vulnerabilities
- Identity and access management solutions
- Network architecture and segmentation
- Hardware assurance best practices
- Specialized technologies
- Non-technical data and privacy controls
- Technical data and privacy controls
- Mitigate software vulnerabilities and attacks
- Mitigate web application vulnerabilities and attacks
- Analyzing applications assessments
- Cloud and automation
- Service-oriented architecture
- Automation concepts and technologies

Zac Livingston
Am if number no up period regard sudden better. Decisively surrounded all admiration and not you. Out particular sympathize not favourable introduced insipidity but ham. Rather number can and set praise. Distrusts an it contented perceived attending oh. Thoroughly estimating.

Course Details:
Course Price:
₹ 19,000
Instructor
Zac Livingston
Lesson Duration
12 Weeks
Language:
English, Hindi