Course Overview

Course Overview to be entered here

Course Curriculum

Course Content

  • Designing Secure Systems, Networks & Devices

    Preview
    • Domain 01: Threats, Vulnerabilities, and Mitigations

      • Threat Actors
      • Attributes of Actors
      • Intent or Motivation
      • Attack Vectors
      • Common Threat Vectors and Attack Surfaces
      • Assisted Practice: Enhancing Server Security
      • Indicators, Indicators of Compromise and Indicators of Attack
      • Assisted Practice: Investigating DoS and MITM Attacks Using Wireshark
      • Malware Attack
      • Assisted Practice: Analyzing Malware Reports Using Virus Total
      • Physical Attack
      • Network Attack
      • Cryptographic Attacks
      • Password Attacks
      • Application Attacks
      • Mitigation Techniques to Secure the Enterprise
      • Assisted Practice: Implementing Public Key Infrastructure
      • Assisted Practice: Generating a Web Server Certificate
    • Domain 02: Security Architecture

      • Security Implications of Different Architecture Models
      • Security Principles to Secure Enterprise Infrastructure
      • Firewall Categories
      • Unified Threat Management (UTM)
      • Next-Generation Firewall (NGF)
      • Web Application Firewall
      • Proxy Server
      • Intrusion Detection and Prevention System
      • Virtual Private Network
      • Network Access Control
      • Concepts and Strategies to Protect Data
      • Privacy Regulations
      • Data Protection Controls
      • Data Classification
      • Business Continuity Planning
      • High Availability
      • Site Consideration
      • Backups
      • Power
      • Cloud Data Replications
      • Testing
      • Platform Diversity
      • Multicloud
      • Capacity Management
    • Domain 3: Security Operations

      • Establishing Baselines
      • Hardening of Devices
      • Wireless Technologies
      • Mobile Management and Security
      • Application Security
      • Sandboxing
      • Monitoring
      • Security Implications of Proper Hardware, Software, and Data Asset Management
      • Vulnerability Assessment
      • System and Process Audit
      • Assisted Practice: Scanning Local VM Using Nessus
      • Assisted Practice: Scanning Local VM Using Nessus Security Alerting and Monitoring Concepts and Tools
      • Modifying Enterprise capabilities to Enhance Security
      • Web Application Firewall
      • Intrusion Detection and Prevention System
      • OSI, TCP/IP and Protocols
      • Web Filtering Technologies
      • Operating System Security
      • Email Security
      • Antivirus, Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR)
      • Secure Protocols
      • Assisted Practice: Configuring Proton VPN
      • Assisted Practice: Implementing Network Segmentation and VLANs
      • Implementing and Maintaining Identity and Access Management
      • Manage the Identity and Access Provisioning Lifecycle
      • Assisted Practice: Installing Active Directory and Creating a User
      • Assisted Practice: Configuring Logon Hours in Active Directory
      • Importance of Automation and Orchestration Related to Secure Operations
      • Incident Response Activities
      • Digital Forensics
      • Use of Data Sources to Support Investigations
      • Assisted Practice: Using Event Viewer to Implement Logging and Forensic Analysis
      • Assisted Practice: Implementing encryption solutions for data at rest using AESCrypt
      • Assisted Practice: Using ROHOS Disk Encryption

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.