Product Details
Topics Covered
- Security Infrastructure and Operations
- Risk Management and Incident Response
- Access Control, Cryptography, and PKI
- Network and Physical Security
- Governance, Compliance, and Vendor Management
- Identity and Access Services
- Threats, Vulnerabilities, and Security Awareness
Key Features
- Mobile-friendly
- Audio-enabled
- Badge and credit-awarding
- Fully accessible
- Games & Flashcards
- Expert-supported
- Video content
Course Preview
Course Description
Learning Outcomes
- Describe the installation and configuration of security infrastructure
- Explain risk management concepts
- Explain incident response procedures
- Compare various access control models
- Compare and contrast the characteristics of different cryptography algorithms and public key infrastructure (PKI)
- Implement secure network concepts and physical security controls
- Implement security governance, compliance, and vendor management frameworks
- Install and configure identity and access services
- Evaluate secure cloud, virtualization, and embedded systems concepts
- Evaluate disaster recovery and digital forensics concepts
- Evaluate cybersecurity threats, including attack types, vulnerabilities, threat actors, and indicators of compromise
- Design and implement security awareness and training programs
- Establish vulnerability management and security monitoring processes
Notes
This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.
As an
Accredited Provider, MindEdge offers for its learning events that comply with the Continuing Education and Training Standard.Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive
credit. Learners will have three attempts at all graded assessments.