Description
- Date: January 25 – 29, 2021 | 11:00 AM – 7:00 PM EST–(Guaranteed To Run)–7 Seats Left. Register Early to secure class.
- Date: February 08 – 12, 2021 | 11:30 AM – 7:30 PM EST—10 Seats Left Register Early to secure class.
- Date: March 01 – 05, 2021 | 8:30 AM – 4:30 PM EST–(Guaranteed To Run)–10 Seats Left. Register Early to secure class.
- Date: March 15 – 19, 2021 | 11:30 AM – 7:30 PM EST—15 Seats Left Register Early to secure class.
- Date: March 29 – 31, 2021 | 12:00 PM – 9:00 PM EST-15 Seats Left Register Early to secure class.
- Date: April 26 – 30, 2021 | 8:30 AM – 4:30 PM EST–(Guaranteed To Run)–12 Seats Left. Register Early to secure class.
These class dates will give a $600.00 Discount if registration is completed before 01/29/2021.
- Delivery Format: Virtual Classroom Live
- Location: ONLINE
Dates are not a fit? Ask about Private Lead Classes for your company teams, with 6 or more employees we will customize training for your organization.
Live Online Outline
- Topic 1A: Compare and Contrast Information Security Roles
- Topic 1B: Compare and Contrast Security Control and Framework Types
- Topic 2A: Explain Threat Actor Types and Attack Vectors
- Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
- Topic 3B: Explain Security Concerns with General Vulnerability Types
- Topic 3C: Summarize Vulnerability Scanning Techniques
- Topic 3D: Explain Penetration Testing Concepts
- Topic 4A: Compare and Contrast Social Engineering Techniques
- Topic 4B: Analyze Indicators of Malware-Based Attacks
- Topic 5A: Compare and Contrast Cryptographic Ciphers
- Topic 5B: Summarize Cryptographic Modes of Operation
- Topic 5C: Summarize Cryptographic Use Cases and Weaknesses
- Topic 5D: Summarize Other Cryptographic Technologies
- Topic 6A: Implement Certificates and Certificate Authorities
- Topic 6B: Implement PKI Management
- Topic 7A: Summarize Authentication Design Concepts
- Topic 7B: Implement Knowledge-Based Authentication
- Topic 7C: Implement Authentication Technologies
- Topic 7D: Summarize Biometrics Authentication Concepts
- Topic 8A: Implement Identity and Account Types
- Exam objectives covered:
- Topic 8B: Implement Account Policies
- Topic 8C: Implement Authorization Solutions
- Topic 8D: Explain the Importance of Personnel Policies
- Topic 9A: Implement Secure Network Designs
- Topic 9B: Implement Secure Switching and Routing
- Topic 9C: Implement Secure Wireless Infrastructure
- Topic 9D: Implement Load Balancers
- Topic 10A: Implement Firewalls and Proxy Servers
- Topic 10B: Implement Network Security Monitoring
- Topic 10C: Summarize the Use of SIEM
- Topic 11A: Implement Secure Network Operations Protocols
- Topic 11B: Implement Secure Application Protocols
- Topic 11C: Implement Secure Remote Access Protocols
- Topic 12A: Implement Secure Firmware
- Topic 12B: Implement Endpoint Security
- Topic 12C: Explain Embedded System Security Implications
- Topic 13A: Implement Mobile Device Management
- Topic 13B: Implement Secure Mobile Device Connections
- Topic 14A: Analyze Indicators of Application Attacks
- Topic 14B: Analyze Indicators of Web Application Attacks
- Topic 14C: Summarize Secure Coding Practices
- Topic 14D: Implement Secure Script Environments
- Topic 14E: Summarize Deployment and Automation Concepts
- Topic 15A: Summarize Secure Cloud and Virtualization Services
- Topic 15B: Apply Cloud Security Solutions
- Topic 15C: Summarize Infrastructure as Code Concepts
- Topic 16A: Explain Privacy and Data Sensitivity Concepts
- Topic 16B: Explain Privacy and Data Protection Controls
- Topic 17A: Summarize Incident Response Procedures
- Topic 17B: Utilize Appropriate Data Sources for Incident Response
- Topic 17C: Apply Mitigation Controls
- Topic 18A: Explain Key Aspects of Digital Forensics Documentation
- Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
- Topic 19A: Explain Risk Management Processes and Concepts
- Topic 20A: Implement Redundancy Strategies
- Topic 20B: Implement Backup Strategies
- Topic 20C: Implement Cybersecurity Resiliency Strategies
- Topic 21A: Explain the Importance of Physical Site Security Controls
- Topic 21B: Explain the Importance of Physical Host Security Controls
Classroom Live Labs
Topic 3A: Assess Organizational Security with Network Reconnaissance Tools
- Assisted Lab: Exploring the Lab Environment
- Assisted Lab: Scanning and Identifying Network Nodes
- Assisted Lab: Intercepting and Interpreting Network Traffic with Packet Sniffing Tools
Topic 3C: Summarize Vulnerability Scanning Techniques
- Assisted Lab: Analyzing the Results of a Credentialed Vulnerability Scan
Topic 4B: Analyze Indicators of Malware-Based Attacks
- Assisted Lab: Installing, Using, and Blocking a Malware-based Backdoor
- APPLIED LAB: Performing Network Reconnaissance and Vulnerability Scanning
Topic 6A: Implement Certificates and Certificate Authorities
- Assisted Lab: Managing the Lifecycle of a Certificate
- Assisted Lab: Managing Certificates with OpenSSL
Topic 7B: Implement Knowledge-Based Authentication
- Assisted Lab: Auditing Passwords with a Password Cracking Utility
Topic 7C: Implement Authentication Technologies
- Assisted Lab: Managing Centralized Authentication
Topic 8B: Implement Account Policies
- Assisted Lab: Managing Access Controls in Windows Server
- Assisted Lab: Configuring a System for Auditing Policies
Topic 8C: Implement Authorization Solutions
- Assisted Lab: Managing Access Controls in Linux
Topic 8D: Explain the Importance of Personnel Policies
- APPLIED LAB: Configuring Identity and Access Management Controls
Topic 9B: Implement Secure Switching and Routing
- Assisted Lab: Implementing a Secure Network Design
Topic 10A: Implement Firewalls and Proxy Servers
- Assisted Lab: Configuring a Firewall
Topic 10B: Implement Network Security Monitoring
- Assisted Lab: Configuring an Intrusion Detection System
Topic 11B: Implement Secure Application Protocols
- Assisted Lab: Implementing Secure Network Addressing Services
Topic 11C: Implement Secure Remote Access Protocols
- Assisted Lab: Implementing a Virtual Private Network
- Assisted Lab: Implementing a Secure SSH Server
Topic 12B: Implement Endpoint Security
- Assisted Lab: Implementing Endpoint Protection
- APPLIED LAB: Securing the Network Infrastructure
Topic 14A: Analyze Indicators of Application Attacks
- Assisted Lab: Identifying Application Attack Indicators
Topic 14B: Analyze Indicators of Web Application Attacks
- Assisted Lab: Identifying a Browser Attack
Topic 14D: Implement Secure Script Environments
- Assisted Lab: Implementing PowerShell Security
- Assisted Lab: Identifying Malicious Code
Topic 14E: Summarize Deployment and Automation Concepts
- APPLIED LAB: Identifying Application Attacks
Topic 17B: Utilize Appropriate Data Sources for Incident Response
- Assisted Lab: Managing Data Sources for Incident Response
Topic 17C: Apply Mitigation Controls
- Assisted Lab: Configuring Mitigation Controls
Topic 18B: Explain Key Aspects of Digital Forensics Evidence Acquisition
Evidence Acquisition
- Assisted Lab: Acquiring Digital Forensics Evidence
Topic 20B: Implement Backup Strategies
- Assisted Lab: Backing Up and Restoring Data in Windows and Linux
Topic 20C: Implement Cybersecurity Resiliency Strategies
- APPLIED LAB: Managing Incident Response, Mitigation and Recovery
Reviews
There are no reviews yet.