Detecção e Respostas

Mostrar todos os Cursos »
Duração do curso

5 dias (40 horas)

Público Alvo

Profissionais que buscam técnicas de defesa contra os principais ataques cibernéticos

Pré-Requisitos Conhecimentos de rede TCP/IP.
Certiricação Security+ ou conhecimentos de conceitos de técnologia aplicada a segurança da informação.

Tópicos Principais

Lesson 1: Assessing Information Security Risk

Topic A: Identify the Importance of Risk Management

Topic B: Assess Risk

Topic C: Mitigate Risk

Topic D: Integrate Documentation into Risk Management

 

Lesson 2: Creating an Information Assurance Lifecycle Process

Topic A: Evaluate Information Assurance Lifecycle Models

Topic B: Align Information Security Operations to the Information Assurance Lifecycle

Topic C: Align Information Assurance and Compliance Regulations

 

Lesson 3: Analyzing Threats to Computing and Network Environments

Topic A: Identify Threat Analysis Models

Topic B: Assess the Impact of Reconnaissance Incidents

Topic C: Assess the Impact of Systems Hacking Attacks

Topic D: Assess the Impact of Malware

Topic E: Assess the Impact of Hijacking and Impersonation Attacks

Topic F: Assess the Impact of Denial of Service Incidents

Topic G: Assess the Impact of Threats to Mobile Security

Topic H: Assess the Impact of Threats to Cloud Security

 

Lesson 4: Designing Secure Computing and Network Environments

Topic A: Information Security Architecture Design Principles

Topic B: Design Access Control Mechanisms

Topic C: Design Cryptographic Security Controls

Topic D: Design Application Security

Topic E: Design Computing Systems Security

Topic F: Design Network Security

 

Lesson 5: Operating Secure Computing and Network Environments

Topic A: Implement Change Management in Security Operations

Topic B: Implement Monitoring in Security Operations

 

Lesson 6: Assessing the Security Posture Within a Risk Management Framework

Topic A: Deploy a Vulnerability Management Platform

Topic B: Conduct Vulnerability Assessments

Topic C: Conduct Penetration Tests on Network Assets

Topic D: Follow Up on Penetration Testing

Lesson 7: Collecting Cybersecurity Intelligence Information

Topic A: Deploy a Security Intelligence Collection and Analysis Platform

Topic B: Collect Data from Security Intelligence Sources

 

Lesson 8: Analyzing Cybersecurity Intelligence Information

Topic A: Analyze Security Intelligence to Address Incidents

Topic B: Using SIEM Tools for Analysis

 

Lesson 9: Responding to Cybersecurity Incidents

Topic A: Deploy an Incident Handling and Response Architecture

Topic B: Perform Real-Time Incident Handling Tasks

Topic C: Prepare for Forensic Investigation

 

Lesson 10: Investigating Cybersecurity Incidents

Topic A: Create a Forensics Investigation Plan

Topic B: Securely Collect Electronic Evidence

Topic C: Identify the Who, Why, and How of an Incident

Topic D: Follow Up on the Results of an Investigation

 

Lesson 11: Auditing Secure Computing and Network Environments

Topic A: Deploy a Systems and Processes Auditing Architecture

Topic B: Prepare for Audits

Topic C: Perform Audits Geared Toward the Information Assurance Lifecycle
Valor

Consulte-nos. Condições especiais para canais de revenda Westcon.

 

Centro de Treinamento Autorizado para

Próximos Cursos Cisco

Próximos Cursos Westcon Group

Contato

Education Team (Brasil)

treinamento.br@westconcomstor-la.com

Telefone 11 5186 4619 | 11 97194-8910