CAST 614 will cover fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy for a fortified perimeter is defined, the course moves on to defending against the sophisticated malware that is on the rise today and the importance of live memory analysis and real time monitoring.
-
Learning Objectives
Students completing this course will gain an in-depth knowledge in the following areas:
- Staging a strong defense against popular security threats
- Fortifying your organization with a good foundation of risk protection methods
- Applying latest references and guidance on best practices in the field of cyber security
- Securing your enterprise architecture from a medium threat level and building towards more sophisticated threats
-
Course Prerequisites
Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in:
- Identifying security weaknesses in computer systems or networks
- Exposing weaknesses for systems owners to fix breaches before being targets of compromise
- Applying hacking and pen testing constructively to defend against various possible attacks
- Analyzing best practices in developing secure system and network configurations
- Establishing a secure baseline in deploying machines in a protected state
- Appreciating popular attack methods applied by hackers in order to fortify their systems
-
Training Purpose
-
Delivery Method
0.0
0 total
5
4
3
2
1