Cybersecurity Foundations

Category ID Duration Level Price
Cyber Security 13198 5 Day(s) Foundation $3,375.00

Cybersecurity Foundations

Live, Online Class Schedule

Delivery Format Date Time Register
Live Online 05/20/2024 - 05/24/2024 8:30 AM - 4:30 PM EDT Register
Live Online 06/03/2024 - 06/07/2024 8:30 AM - 4:30 PM EDT Register
Live Online 07/29/2024 - 08/02/2024 8:30 AM - 4:30 PM EDT Register
Live Online 08/05/2024 - 08/09/2024 8:30 AM - 4:30 PM EDT Register
Live Online 09/30/2024 - 10/04/2024 8:30 AM - 4:30 PM EDT Register
Live Online 10/21/2024 - 10/25/2024 8:30 AM - 4:30 PM EDT Register
Live Online 11/04/2024 - 11/08/2024 8:30 AM - 4:30 PM EDT Register

Live Training Center

Address


Live Online


Live, Online

Call Us

US Toll Free 844-238-8607

Email Us


info@productivitypointls.com

Course Overview

When you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes obvious: An in-depth and thorough understanding of cyber security fundamentals and best practices is absolutely necessary.

In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans.

In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training

Course Objectives

Current cyber threats and cybersecurity site references
Government-mandated directives and compliance requirements
Cyber roles required to successfully design secure systems
The attack cycle perpetrated by malicious hackers
Enterprise policy requirements
Best strategies for securing the enterprise with layered defenses
How security zones and detailed logging augment information assurance Forensic challenges and incident response planning
Risk management process
Goals achievable with auditing, scanning, and testing systems
Industry recommendations for maintaining secure access control
Standards-based cryptographic solutions for securing communications

Productivity Point Learning Solutions evolved out of a desire to increase our outreach both nationally and internationally.

Productivity Point Headquarters
1580 Sawgrass Corporate Parkway
Suite 205
Sunrise, Florida 33323
United States

Contact
T 1-844-238-8607
P 1-954-425-6141
F 1-954-928-9057
E info@productivitypointls.com

© Copyright 2024 Productivity Point Learning Solutions. All Rights Reserved.