Certified Security Principles (CSP) - e-learning
Vijfhart, dat klopt voor jou!
- Oefenomgeving tot 3 maanden na afronding beschikbaar
- Flexgarantie: wissel eenvoudig van virtueel naar fysiek, of andersom
- Kennisgarantie: volg jouw cursus gratis nog een keer, fysiek of virtueel
- Ontvang een gratis proefexamen bij meerdere opleidingen
- Kies voor een Microsoft-cursus bij Vijfhart en ontvang gratis het officiële Microsoft-examen* t.w.v. max. €155,-.
Lesmethode :
etraining
Algemeen :
We offer you the following benefits for this Mile2 course:
#This e-learning includes an exam.
#The material is accessible 365 days after activation.
#The exam voucher is valid 365 days after activation.
The IT world never stands still. Therefore, neither can IT security. It does not matter if we are talking about the implementation of IoT devices or cloud services, security is at the forefront of all of them. According to a recent study, the top source of security incidents within a company are the current employees. We do not want you to be one of them.
This course is going to prepare you for security across the entire environment including understanding …
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
Vijfhart, dat klopt voor jou!
- Oefenomgeving tot 3 maanden na afronding beschikbaar
- Flexgarantie: wissel eenvoudig van virtueel naar fysiek, of andersom
- Kennisgarantie: volg jouw cursus gratis nog een keer, fysiek of virtueel
- Ontvang een gratis proefexamen bij meerdere opleidingen
- Kies voor een Microsoft-cursus bij Vijfhart en ontvang gratis het officiële Microsoft-examen* t.w.v. max. €155,-.
Lesmethode :
etraining
Algemeen :
We offer you the following benefits for this Mile2
course:
#This e-learning includes an exam.
#The material is accessible 365 days after activation.
#The exam voucher is valid 365 days after activation.
The IT world never stands still. Therefore, neither can IT
security. It does not matter if we are talking about the
implementation of IoT devices or cloud services, security is at the
forefront of all of them. According to a recent study, the top
source of security incidents within a company are the current
employees. We do not want you to be one of them.
This course is going to prepare you for security across the entire
environment including understanding risk management, identity and
access control, network and data security. This is just a short
list of everything that we cover within this course, which will
include new technologies like IoT and cloud services.
This course is intended to prepare you to be a benefit to any
company that is attempting to improve its security posture! With
this certification, you will be marketable to any company, anywhere
in the globe.
This course is in English
Doel :
# Fully understand Security from a real-world viewpoint
# Implement security controls on systems within an environment,
network, data, servers, host, mobile, cloud
# Understand risk management and how each individual or department
can be part of reducing risk
# Understand cryptography at the basic level to ensure a company is
implementing this correctly
# Understand how to impose controls for mobile and IoT devices
# Prepare for the CSP or Security+ certification
# Become part of the solution for improving the security posture of
your company
Doelgroep :
IT Professionals, Server Administrators, Network Administrators, Virtualization and Cloud Administrators, anyone that needs a general understanding of security, those seeking the Security+ Certification, 8570 Directive
Voorkennis :
Recommended minimum one-year of experience with server administration or network administration. General understanding of business processes is beneficial.
Onderwerpen :
- Module 1 - Introduction to IT Security
- Understanding Security
- Responsibilities
- Building a Security Program
- CIA Triad
- Governance, Risk, Compliance
- State of Security Today
- Module 2 - Risk Management
- Risk Management
- Risk Assessment
- Types of Risk, Threats and Vulnerabilities
- Mitigating Attacks
- Discovering Vulnerabilities and Threats
- Responding to Risk
- Module 3 - Understanding of Cryptography
- Understanding Cryptography
- Symmetric Encryption
- Asymmetric Encryption
- Hashing
- PKI
- Cryptography in Use
- Module 4 - Understanding Identity and Access Management
- Identity Management
- Authentication Techniques
- Single Sign-on
- Access Control Monitoring
- Module 5 - Managing Data Security
- Virtualization Principles
- Key Components Mapped to Cloud Layer
- Key Security Concerns
- Other Technologies Used in the Cloud
- The Layers
- Relevant CCM Controls
- Module 6 - Data Security
- Different Types of Storage
- Encryption Options
- Data Management
- Module 7 - Managing Server/Host Security
- The Operating Systems
- Hardening the OS
- Physical security
- Virtualization and Cloud Technologies
- Module 8 - Application Security for Non-Developers
- Application Security Principle
- Software Development Life Cycle
- OWASP Top 10
- Hardening Web Applications
- Patch/Update/Configuration Management
- Module 9 - Understanding Mobile Device Security (IoT)
- What Devices are we talking about?
- What is the risk?
- Hardening Mobile/IoT Devices
- Corporate Management
- Module 10 - Managing Day to Day Security
- Company Responsibilities
- Product Management
- Business Continuity Basics
- Incident ResponseWhy Train?
- Module 11 - Understating Compliance and Auditing
- Benefits of Compliance
- Assurance Frameworks
- What is Auditing
Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.
