Course Benefits
THREATS, ATTACKS & VULNERABILITIES
Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
TECHNOLOGIES & TOOLS
Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security
ARCHITECTURE & DESIGN
Implement secure network architecture concepts and systems design
IDENTITY & ACCESS MANAGEMENT
Install and configure identity and access services, as well as management controls
RISK MANAGEMENT
Implement and summarize risk management best practices and the business impact
CRYPTOGRAPHY & PKI
Install and configure wireless security settings and implement public key infrastructure