Objectives can be separated into these domains: Threats, Attacks and Vulnerabilities Technologies and Tools Architecture and Design Identity and Access Management Risk Management Cryptography and PKI Inside of these domains, you can find these topics: Compare and Contrast Information Security Roles Compare and Contrast Security Control and Framework Types Explain Threat Actor Types and Attack Vectors Explain Threat Intelligence Sources
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
Description
- Threats, Attacks and Vulnerabilities
- Technologies and Tools
- Architecture and Design
- Identity and Access Management
- Risk Management
- Cryptography and PKI
Prerequisites
- Participants should have basic experience administering MS Windows systems
- Participants should have basic experience administering Unix/Linux systems
- Participants should have at least basic knowledge of cyber security at least on the level of the S0 course
Audience