Centralino: 0571 997787

Numero attivo in orario lavorativo

CompTIA Cysa+

Category:
Tecnologie

Security

Ruolo

Engineer, Integration Engineer, Network Engineer, Support Engineer, System Engineer

Vendor

CompTia

Durata

5 Giorni

Al momento non sono disponibili edizioni del corso

2,000.00

Dettagli

Powered by Dadonet Academy Srl
Il corso è composto da 8 lezioni da 5 ore ciascuna
Orario 8:30 – 13:30

PROGRAMMA

 

Modulo 1: Threat Management

 

Cybersecurity Analysts

Cybersecurity Roles and Responsibilities

Frameworks and Security Controls

Risk Evaluation

Penetration Testing Processes

Reconnaissance Techniques

The Kill Chain

Open Source Intelligence

Social Engineering

Topology Discovery

Service Discovery

OS Fingerprinting

 

Modulo 2: Threat Management

 

Security Appliances

Configuring Firewalls

Intrusion Detection and Prevention

Configuring IDS

Malware Threats

Configuring Anti-Virus Software

Sysinternals

Enhanced Mitigation Experience Toolkit

Logging and Analysis

Packet Capture

Packet Capture and Monitoring Tools

Log Review and SIEM

SIEM Data Outputs

SIEM Data Analysis

Point-in-time Data Analysis

 

Modulo 3: Vulnerability Management

 

Managing Vulnerabilities

Vulnerability Management Requirements

Asset Inventory

Data Classification

Vulnerability Management Processes

Vulnerability Scanners

Microsoft Baseline Security Analyser

Vulnerability Feeds and SCAP

Configuring Vulnerability Scans

Vulnerability Scanning Criteria

Exploit Frameworks

Remediating Vulnerabilities

Analysing Vulnerability Scans

Remediation and Change Control

Remediating Host Vulnerabilities

Remediating Network Vulnerabilities

Remediating Virtual Infrastructure Vulnerabilities

Secure Software Development

Software Development Life Cycle

Software Vulnerabilities

Software Security Testing

Interception Proxies

Web Application Firewalls

Source Authenticity

Reverse Engineering

 

Modulo 4: Cyber Incident Response

 

Incident Response

Incident Response Processes

Threat Classification

Incident Severity and Prioritisation

Types of Data

Forensics Tools

Digital Forensics Investigations

Documentation and Forms

Digital Forensics Crime Scenes

Digital Forensics Kits

Image Acquisition

Password Cracking

Analysis Utilities

Incident Analysis and Recovery

Analysis and Recovery Frameworks

Analysing Network Symptoms

Analysing Host Symptoms

Analysing Data Exfiltration

Analysing Application Symptoms

Using Sysinternals

Containment, Eradication, and Validation Techniques

Corrective Actions

 

Modulo 5: Security Architecture

 

Secure Network Design

Network Segmentation

Blackholes, Sinkholes, and Honeypots

System Hardening

Group Policies and MAC

Endpoint Security

Managing Identities and Access

Network Access Control

Identity Management

Identity Security Issues

Identity Repositories

Context-based Authentication

Single Sign-On and Federation

Exploiting Identities

Exploiting Web Browsers and Applications

Security Frameworks and Policies

Frameworks and Compliance

Reviewing Security Architecture

Procedures and Compensating Controls

Verifications and Quality Control

Security Policies and Procedures

Personnel Policies and Training

EDU.Labs by Computer Gross
Via del Pino 1 - 50053 Empoli (FI) - Italia - P. I. 04801490485 - C.F. 02500250168
info@educationlabs.it | 0571 997787