Tecnologie | Security |
---|---|
Ruolo | Engineer, Integration Engineer, Network Engineer, Support Engineer, System Engineer |
Vendor | CompTia |
Durata | 5 Giorni |
€2,000.00
Powered by Dadonet Academy Srl
Il corso è composto da 8 lezioni da 5 ore ciascuna
Orario 8:30 – 13:30
PROGRAMMA
Part I: Threats, Attacks, and Vulnerabilities
The Social Engineer
Phishing and Related Attacks
Principles of Influence (Reasons for Effectiveness)
Malware
Physical Attacks
Adversarial Artificial Intelligence (AI)
Password Attacks
Downgrade Attacks
Race Conditions
Improper Software Handling
Resource Exhaustion
Overflows
Code Injections
Driver Manipulation
Request Forgeries
Directory Traversal
Replay Attack
Secure Sockets Layer (SSL) Stripping
Application Programming Interface (API) Attacks
Pass-the-Hash Attack
Wireless
Man-in-the-Middle
Layer 2 Attacks
Domain Name System (DNS) Attacks
Denial of Service
Malicious Code and Script Execution
Threat Actor Attributes
Threat Actor Types
Vectors
Threat Intelligence and Research Sources
Cloud-Based vs. On-Premises
Zero-Day
Weak Configurations
Third-Party Risks
Impacts
Vulnerability Scans
Threat Assessment
Testing Methodology
Team Exercises
Part II: Architecture and Design
Configuration Management
Data Confidentiality
Deception and Disruption
Virtualization
On-Premises vs. Off-Premises
Cloud Models
Application Environment
Integrity Measurement
Change Management and Version Control
Secure Coding Techniques
Automation and Scripting
Scalability and Elasticity
Identification and Authentication, Authorization, and Accounting (AAA)
Multifactor Authentication
Single Sign-on
Authentication Technologies
Redundancy
Backups
Defense in Depth
Embedded Systems
SCADA and ICS
Smart Devices and IoT
Perimeter Security
Internal Security
Equipment Security
Environmental Controls
Secure Data Destruction
Cryptosystems
Use of Proven Technologies and Implementation
Steganography
Cryptography Use Cases
Cryptography Constraints
Part III: Implementation
Secure Web Protocols
Secure File Transfer Protocols
Secure Email Protocols
Secure Internet Protocols
Secure Protocol Use Cases
Endpoint Protection
Application Security
Hardware and Firmware Security
Operating System Security
Network Devices and Segmentation
Security Devices and Boundaries
Access Methods
Wireless Cryptographic Protocols
Authentication Protocols
Wireless Access Installations
Communication Methods
Mobile Device Management Concepts
Enforcement and Monitoring
Deployment Models
Cloud Workloads
Third-Party Cloud Security Solutions
Account Types
Account Management
Account Policy Enforcement
Authentication
Access Control
PKI Components
Part IV: Operations and Incident Response
Shell and Script Environments
Network Reconnaissance and Discovery
Packet Capture and Replay
Password Crackers
Forensics and Data Sanitization
Attack Frameworks
Incident Response Plan
Incident Response Process
Continuity and Recovery Plans
SIEM Dashboards
Logging
Network Activity
Containment and Eradication
Data Breach Notifications
Strategic Intelligence/Counterintelligence Gathering
Track Person-hours
Order of Volatility
Chain of Custody
Data Acquisition
Part V: Governance, Risk, and Compliance
Nature of Controls
Functional Use of Controls
Compensating Controls
Industry-Standard Frameworks and Reference Architectures
Benchmarks and Secure Configuration Guides
Policy Framework
Human Resource Management Policies
Third-Party Risk Management
Risk Analysis
Risk Assessment
Business Impact Analysis
Sensitive Data Protection
Privacy Impact Assessment
EDU.Labs by Computer Gross
Via del Pino 1 - 50053 Empoli (FI) - Italia - P. I. 04801490485 - C.F. 02500250168
info@educationlabs.it | 0571 997787