Site Powered by nite.org

Cybersecurity Foundations
Build skills in cybersecurity
  • Credit Hours: 5 Days

  • Format: Virtual Classroom - Instructor-led, Online

  • Professional Certificate: none

  • Recommended for: Information security analysts and Network security specialists

The Cybersecurity Foundations program prepares students for employment in the Informational Technology industry. Through theory-based lectures and virtual labs, students will understand the challenges of designing a secure system from a global perspective. Students will gain the knowledge of designing a secure systems, as well as touching on the cyber roles needed to provide a cohesive security solution. Students will also learn about the non-technical aspects of cybersecurity, which is necessary to mitigate risk. The courses curriculum satisfies the requirements needed to obtain employment and/or career advancement.

This course prepares students for employment as an Information Security Analyst. According to the Bureau of Labor Statistics, employment change between 2010 and 2020 will grow by 22% greater than the annual average.

What You'll Learn

  • Current cyber threats and cybersecurity site references
  • Government-mandated directives and compliance requirements
  • Cyber roles required to successfully design secure systems
  • The attack cycle perpetrated by malicious hackers
  • Enterprise policy requirements
  • Best strategies for securing the enterprise with layered defenses
  • How security zones and detailed logging augment information assurance
  • Forensic challenges and incident response planning
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Industry recommendations for maintaining secure access control
  • Standards-based cryptographic solutions for securing communications

Who Needs to Attend

Information security analysts and Network security specialists

Prerequisites

  • TCP/IP Networking or equivalent knowledge

 

Purchase this Course

$3395.00

Become versed as an Information Security Analyst in 5 Days