Course Details
Course Outline
1 - Supporting IT Governance and Risk Management
Identify the Importance of IT Governance and Risk ManagementAssess RiskMitigate RiskIntegrate Documentation into Risk Management
2 - Leveraging Collaboration to Support Security
Facilitate Collaboration Across Business UnitsSecure Communications and Collaboration Solutions
3 - Using Research and Analysis to Secure the Enterprise
Determine Industry Trends and Their Effects on the EnterpriseAnalyze Scenarios to Secure the Enterprise
4 - Integrating Advanced Authentication and Authorization Techniques
Implement Authentication and Authorization TechnologiesImplement Advanced Identity and Access Management
5 - Implementing Cryptographic Techniques
Select Cryptographic TechniquesImplement Cryptography
6 - Implementing Security Controls for Hosts
Select Host Hardware and SoftwareHarden HostsVirtualize Servers and DesktopsProtect Boot Loaders
7 - Implementing Security Controls for Mobile Devices
Implement Mobile Device ManagementAddress Security and Privacy Concerns for Mobile Devices
8 - Implementing Network Security
Plan Deployment of Network Security Components and DevicesPlan Deployment of Network-Enabled DevicesImplement Advanced Network DesignImplement Network Security Controls
9 - Implementing Security in the Systems and Software Development Lifecycle
Implement Security Throughout the Technology LifecycleIdentify General Application VulnerabilitiesIdentify Web Application VulnerabilitiesImplement Application Security Controls
10 - Integrating Assets in a Secure Enterprise Architecture
Integrate Standards and Best Practices in Enterprise SecuritySelect Technical Deployment ModelsIntegrate Cloud-Augmented Security ServicesSecure the Design of the Enterprise InfrastructureIntegrate Data Security in the Enterprise ArchitectureIntegrate Enterprise Applications in a Secure Architecture
11 - Conducting Security Assessments
Select Security Assessment MethodsPerform Security Assessments with Appropriate Tools
12 - Responding to and Recovering from Incidents
Prepare for Incident Response and Forensic InvestigationsConduct Incident Response and Forensic Analysis
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
This course is designed for IT professionals in the cybersecurity industry whose primary job responsibility is to secure complex enterprise environments. The target student should have real-world experience with the technical administration of these enterprise environments. It is recommended for students with at least 10 years of experience in IT management, with at least 5 of those years in hands-on technical security.
Other Prerequisites
10 years experience in IT administration, including at least 5 years of hands-on technical security experience, are recommended, but not required