![]() |
|
|
|
Course Description | Outline | Cybersecurity Training | IT Training
Day 1 - Edge SecurityDay 1 starts off by identifying the methodology of the layered security model. At the outermost perimeter we focus on Edge Security. A variety of device types will be discussed, focusing on the best practices for strengthening a network perimeter. Simplicity and effectiveness will be the underlying factor as we cover designing and building a solid first line of defense.
Day 2 - Network SecurityDay 2 continues with the layered security model as we look in-depth at internal network protection. In this module protecting data while it is in transit will be a topic focus. In addition, a comprehensive approach to controlling access to network traffic will be explored.
Day 3 - Endpoint SecurityDay 3 explores the final layer of the layered security model covered in this course. During this module the focus will be protecting devices that serve the end user such as workstations, servers, and other peripherals. We will also cover integrating Endpoint Security with the other layers in order to provide a cohesive defense.
Day 4 - Threat Monitoring & ResponseDay 4 uses SIEM technology to audit the effectiveness of the layered security model and protect assets by correlating security events across a network or an entire enterprise. Proper processes for identifying and responding to security breaches will be outlined, as well as vendor solutions managing this complex data.
|