C)ISRM: Information Systems Risk Manager
Description In this course, you will first learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, […]
Description In this course, you will first learn to assess a system, then implement risk controls. Finally, you will be able to monitor and maintain risk procedures. With this training, […]
Description In this course you will cover 5 Key Elements of Pen Testing; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. Plus, discover the latest vulnerabilities and the techniques malicious hackers […]
Description If you intend to pass the CompTIA Security+ (Exam SY0-701) certification examination, this course can be a significant part of your preparation. But certification is not the only key […]
Description This course covers network defense and incident response methods, tactics, and procedures that are in alignment with industry frameworks such as NIST 800-61r2 (Computer Security Incident Handling Guide), US-CERT's […]
Description Defining the Security Operations Center Understanding Network Infrastructure and Network Security Monitoring Tools Exploring Data Type Categories Understanding Basic Cryptography Concepts Understanding Common TCP/IP Attacks Understanding Endpoint Security Technologies […]