The goal of this course is to help you secure your environment by understanding how hackers operate and the vulnerabilities they attack. You will leave with a complete security toolkit, including security standards, tools and methodologies, and the skills to implement them.
Cyber security should be an ongoing process, and it is important to keep employees up to date as hacker evolve the attacks they use.
What will I learn
A wide range of modules cover role-specific requirements such as:
- The risk’s to Information Systems.
- How systems get compromised.
- The controls used to defend.
- The role of Audits & PenTests.
- Incident Response & DR.
- Cloud Security.
- SOC’s and IOC’s.
- Mitre Attack Framework.
- Information Privacy.
- Laws & regulations.