aroushtech.in

Course Details

Home - Course Details

CyberSys

Description

Course Outline

  1. Introduction
  2. Indentigy security control types
  3. Threat intelligence sharing
  4. Classifying threats
  5. Threat hunting
  6. Network forensics
  7. Appliance monitoring
  8. Endpoint monitoring
  9. Email monitoring
  10. Configuration your SIEM
  11. Analyzing your SIEM
  12. Digital forensics
  13. Analyzing network IOCs
  14. Analyzing host-related IOCs
  15. Analyzing lateral Movement and pivoting IOCs
  16. Incident response preparation
  17. Detection and containment
  18. Containment, eradication, recovery, and post-incident actions
  19. Risk mitigation
  20. Frameworks, policies, and procedures
  21. Enumeration tools
  22. Vulnerability scanning
  23. Analyzing output from vulnerability scanners
  24. Mitigating vulnerabilities
  25. Identity and access management solutions
  26. Network architecture and segmentation
  27. Hardware assurance best practices
  28. Specialized technologies
  29. Non-technical data and privacy controls
  30. Technical data and privacy controls
  31. Mitigate software vulnerabilities and attacks
  32. Mitigate web application vulnerabilities and attacks
  33. Analyzing applications assessments
  34. Cloud and automation
  35. Service-oriented architecture
  36. Automation concepts and technologies

 

Zac Livingston

Am if number no up period regard sudden better. Decisively surrounded all admiration and not you. Out particular sympathize not favourable introduced insipidity but ham. Rather number can and set praise. Distrusts an it contented perceived attending oh. Thoroughly estimating.

Course Details:

Course Price:

₹ 19,000

Instructor

Zac Livingston

Lesson Duration

12 Weeks

Language:

English, Hindi

Certifications

Scroll to Top