Course curriculum
-
-
Description
-
-
-
1- Instructor Intro
-
2-About the Exam
-
3 - Test Taking Tips and Techniques
-
4-Explain the importance of threat data and intelligence
-
5 - Given a scenario, utilize threat intelligence to support organizational security
-
6-Given a scenario, perform vulnerability management activities Pt 1
-
7-Given a scenario, perform vulnerability management activities Pt 2
-
8-Given a scenario, analyze the output from common vulnerability assessment tools
-
9-Explain the threats and vulnerabilities associated with specialized technology
-
10-Explain the threats and vulnerabilities associated with operating in the Cloud
-
11-Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 1
-
12-Given a scenario, implement controls to mitigate attacks and software vulnerabilities Pt 2
-
-
-
1 - Given a scenario, apply security solutions for infrastructure management Pt 1
-
2 - Given a scenario, apply security solutions for infrastructure management Pt 2
-
3 - Given a scenario, apply security solutions for infrastructure management Pt 3
-
4 - Explain software assurance best practices
-
5 - Explain hardware assurance best practices
-
-
-
1 - Given a scenario, analyze data as part of security monitoring activities Pt 1
-
2 - Given a scenario, analyze data as part of security monitoring activities Pt 2
-
3-Given a scenario, analyze data as part of security monitoring activities Pt 3
-
6-Explain the importance of proactive threat hunting
-
7-Compare and contrast automation concepts and technologies
-
4 - Given a scenario, implement configuration changes to existing controls to improve security Pt 1
-
5-Given a scenario, implement configuration changes to existing controls to improve security Pt 2
-
-
-
1 - Explain the importance of the incident response process
-
2 - Given a scenario, apply the appropriate the incident response procedure
-
3 - Given an incident, analyze potential indicators of compromise
-
4 - Given a scenario, utilize basic digital forensic techniques
-
-
-
1 - Understand the importance of data privacy and protection
-
2-Given a scenario, apply security concepts in support of organizational risk mitigation Pt 1
-
3 - Given a scenario, apply security concepts in support of organizational risk mitigation Pt 2
-
4-Explain the importance of frameworks, policies, procedures, and controls Pt 1
-
5-Explain the importance of frameworks, policies, procedures, and controls Pt 2
-

About this course
- £229.00
- 44 lessons
- 14 hours of video content