Cyber and cloud security

This program is designed to help you learn the intricacies of protecting sensitive data, PII, PHI, IP etc. Get started with cyber/cloud security.
Course Description:
Real-Time classes with Live instructors
40-hour run time
8 weeks
Price:USD 260
Early bird: USD 235 (till 15th May) pay by bank transfer? see details
Benefits
  • Accredited Curriculum
  • Learn from experts
  • Professional Certificate
  • Guaranteed Career growth
  • Earn a valuable certificate to boost your portfolio
  • Real-time practical
  • Meetup with Industry experts
  • CV Review

This program is designed to help you learn the intricacies of protecting sensitive data, PII, PHI, IP etc.

Cyber Security
  1. Module 1:
    • The Necessity of Information Security
    • Confidentiality
    • Integrity and availability of Information Assets
    • Information Security
    • Threats and Vulnerabilities
    • Information Security, and 10 Major Threats
  2. Module 2:
    • Recent Threats and Countermeasures
    • Targeted Attacks
    • Invasion Routes for Targeted Attacks
    • Signatures of Targeted Attacks
    • Countermeasures for Targeted Attacks
    • Ransomware
    • Business Mail Fraud
    • Security Countermeasures
  3. Module 3:
    • Security measures in working style reform
    • Working style reform
    • Working style reform and ICT utilization
    • Security measures
    • Case study
  4. Module 4:
    • Importance of information security
    • Threats to use of computers
    • Cyber Security User Account and Groups in detail
    • examples of information security damage and information security
  5. Module 5:
    • Unauthorized Access Overview
    • Unauthorized Access
    • Unauthorized Access Approach
    • Unauthorized Access Prohibited Act
  6. Module 6:
    • Desktop security measures
    • Utilization of password
    • Utilization of file access right
    • Other technical measures
  7. Module 7:
    • Anti -virus software
    • What is a computer virus
    • Anti-virus software
    • Preventive measures guidelines
  8. Module 8:
    • Security measures by cryptographic technology
    • measures against threats on the network
    • use of cryptographic technology and cryptographic technology
  9. Module 9:
    • Corporate Ethics
    • Security Policy
    • Environment and Security Policy Surrounding Companies
Cloud Security
  1. Cloud Concepts, Architecture, and Design
    • Understand Cloud Computing Concepts
    • Describe Cloud Reference Architecture
    • Understand Security Concepts Relevant to Cloud Computing
    • Understand the Design Principles of Secure Cloud Computing
    • Evaluate Cloud Service Providers
  2. Cloud Platform and Infrastructure Security
    • Comprehend Cloud Infrastructure Components
    • Analyse Risks Associated to Cloud Infrastructure
    • Design and Plan Security Controls
    • Plan Disaster Recovery and Business Continuity Management
  3. Cloud Application Security
    • Training and Awareness in Application Security
    • Understand Cloud Software Assurance and Validation
    • Use Verified Secure Software
    • Software Development Lifecycle (SDLC) Process
    • Secure Software Development Lifecycle
    • Cloud Application Architecture
    • Identity and Access Management (IAM) Solutions
  4. Cloud Security Operations
    • Support the Planning Process of the Data Centre Design
    • Implement and Build Physical Infrastructure on Cloud Environment
    • Run Physical Infrastructure for Cloud Environment
    • Manage Physical Infrastructure for Cloud Environment
    • Build Logical Infrastructure for Cloud Environment
    • Run Logical Infrastructure for Cloud Environment
    • Manage Logical Infrastructure for Cloud Environment
    • Ensure Compliance with Regulations and Controls
    • Conduct Risk Assessment for Logical and Physical Infrastructure
    • Understand the Collection and Preservation of Digital Evidence
    • Manage Communications with Relevant Parties
NOTE: For more info, contact us at mail@wentors.com.