5 Days(40 hours)
Recognizing the vulnerabilities of information security and threats in the context of risk management.
Operate on a foundational level some of the operating systems computing environments.
Basic knowledge of the concepts and operational framework of common safeguards assurance in computing environments. Safeguards include, but are not limited to, basic authentication and authorization,resource permissions, and anti-malware mechanisms.
Operate on a foundational level some common concepts for network environments, such as routing and switching.
Basic knowledge of concepts and operational framework of common safeguards assurance in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and a virtual private networks (VPNs)
Assessing Information Security Risk
Creating an Information Assurance Lifecycle Process
Analyzing Threats to Computing and Network Environments
Designing Secure Computing and Network Environments
Operating Secure Computing and Network Environments
Assessing the Security Posture within a Risk management Framework
Collecting Cybersecurity Intelligence Information
Analyzing Cybersecurity Intelligence Information
Responding to Cybersecurity Incidents
Investigating Cybersecurity incidents
Auditing Secure Computing and Network Environments
Laboratorios: Virtuales, 3 VM por pod, 1o 2 alumnos por POD