Product Details
Topics Covered
- Social engineering techniques
- Types of vulnerabilities
- Redundancy
- Cybersecurity resilience
- Indicators of attack (IoA)
- Penetration testing
- Security in cloud
- Enterprise environments
- Embedded and specialized systems
- Authentication, authorization, identity, and account management concepts
- Physical security
- Cryptography
- Risk management
- Threat actors, vectors, and intelligence sources
Key Features
- Mobile-friendly
- Audio-enabled
- Fully accessible
- Games & Flashcards
- Expert-supported
- Video content
Course Preview
Course Description
Learning Outcomes
- Compare and contrast various types of cyberattacks
- Describe the installation and configuration of network devices
- Implement secure network concepts
- Evaluate secure cloud, virtualization, and embedded systems concepts
- Install and configure identity and access services
- Compare various access control models
- Explain risk management concepts
- Explain incident response procedures
- Evaluate disaster recovery and digital forensics concepts
- Compare and contrast the characteristics of different cryptography algorithms and public key infrastructure (PKI)
Notes
This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.
As an
Accredited Provider, MindEdge offers for its learning events that comply with the Continuing Education and Training Standard.Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive
credit. Learners will have three attempts at all graded assessments.