Cyber and cloud security
This program is designed to help you learn the intricacies of protecting sensitive data, PII, PHI, IP etc. Get started with cyber/cloud security.Course Description:
Real-Time classes with Live instructors40-hour run time
8 weeks
Benefits
- Accredited Curriculum
- Learn from experts
- Professional Certificate
- Guaranteed Career growth
- Earn a valuable certificate to boost your portfolio
- Real-time practical
- Meetup with Industry experts
- CV Review
This program is designed to help you learn the intricacies of protecting sensitive data, PII, PHI, IP etc.
Cyber Security
- Module 1:
- The Necessity of Information Security
- Confidentiality
- Integrity and availability of Information Assets
- Information Security
- Threats and Vulnerabilities
- Information Security, and 10 Major Threats
- Module 2:
- Recent Threats and Countermeasures
- Targeted Attacks
- Invasion Routes for Targeted Attacks
- Signatures of Targeted Attacks
- Countermeasures for Targeted Attacks
- Ransomware
- Business Mail Fraud
- Security Countermeasures
- Module 3:
- Security measures in working style reform
- Working style reform
- Working style reform and ICT utilization
- Security measures
- Case study
- Module 4:
- Importance of information security
- Threats to use of computers
- Cyber Security User Account and Groups in detail
- examples of information security damage and information security
- Module 5:
- Unauthorized Access Overview
- Unauthorized Access
- Unauthorized Access Approach
- Unauthorized Access Prohibited Act
- Module 6:
- Desktop security measures
- Utilization of password
- Utilization of file access right
- Other technical measures
- Module 7:
- Anti -virus software
- What is a computer virus
- Anti-virus software
- Preventive measures guidelines
- Module 8:
- Security measures by cryptographic technology
- measures against threats on the network
- use of cryptographic technology and cryptographic technology
- Module 9:
- Corporate Ethics
- Security Policy
- Environment and Security Policy Surrounding Companies
Cloud Security
- Cloud Concepts, Architecture, and Design
- Understand Cloud Computing Concepts
- Describe Cloud Reference Architecture
- Understand Security Concepts Relevant to Cloud Computing
- Understand the Design Principles of Secure Cloud Computing
- Evaluate Cloud Service Providers
- Cloud Platform and Infrastructure Security
- Comprehend Cloud Infrastructure Components
- Analyse Risks Associated to Cloud Infrastructure
- Design and Plan Security Controls
- Plan Disaster Recovery and Business Continuity Management
- Cloud Application Security
- Training and Awareness in Application Security
- Understand Cloud Software Assurance and Validation
- Use Verified Secure Software
- Software Development Lifecycle (SDLC) Process
- Secure Software Development Lifecycle
- Cloud Application Architecture
- Identity and Access Management (IAM) Solutions
- Cloud Security Operations
- Support the Planning Process of the Data Centre Design
- Implement and Build Physical Infrastructure on Cloud Environment
- Run Physical Infrastructure for Cloud Environment
- Manage Physical Infrastructure for Cloud Environment
- Build Logical Infrastructure for Cloud Environment
- Run Logical Infrastructure for Cloud Environment
- Manage Logical Infrastructure for Cloud Environment
- Ensure Compliance with Regulations and Controls
- Conduct Risk Assessment for Logical and Physical Infrastructure
- Understand the Collection and Preservation of Digital Evidence
- Manage Communications with Relevant Parties
NOTE: For more info, contact us at mail@wentors.com.