Objectives of the training
At the end of this training, the participant will be able to apply information protection processes in order to secure all types of networks present in his organization.Targeted audience
IT people who do not have specific knowledge in cybersecurity but who would like to improve their skills.Prerequisite
NoneTrainers
Course architecture
- Network attacks and defense strategies.
- Administrative controls.
- Technical controls.
- Network security perimeter.
- Security of Windows systems.
- Linux systems security.
- Mobile device security.
- Security of connected objects (IoT).
- Application security.
- Data security.
- Virtual network security.
- Cloud security.
- Wireless security.
- Network traffic monitoring.
- Network log analysis.
- Incident and Investigation Management.
- Business Continuity and Disaster Management.
- Risk Management.
- Threat and attack surface analysis.
- Threat management and prediction.
Pedagogical details
Training architecture
Study recent cases of cyberattacks. Through a multitude of hands-on exercises, you will gain technical knowledge to help blue teams defend themselves and win the war against network breaches.
Training Notes
Exam cost included - Exam in English This training will give you access to the Code Red - Blue Team Starter pack, which is a series of online videos giving access to practical exercises. Certification delivered by EC-Council
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote