Network & Security Training Course

This Course is design to clear Network security Concepts. Network Security is needed to prevent and monitor unauthorized access, modification, misuse, or denial of a computer network and network-acces...

  • All levels
  • English

Course Description

This Course is design to clear Network security Concepts. Network Security is needed to prevent and monitor unauthorized access, modification, misuse, or denial of a computer network and network-accessible resources. As the internet evolves and computer networks become bigger and bigger, network security has emerged as one of the most important factors for companies to consider. BIT offer Certifie...

This Course is design to clear Network security Concepts. Network Security is needed to prevent and monitor unauthorized access, modification, misuse, or denial of a computer network and network-accessible resources. As the internet evolves and computer networks become bigger and bigger, network security has emerged as one of the most important factors for companies to consider. BIT offer Certified Network Defense, Advanced Network Défense, Cisco Network Security Audit, Network Security Expert and many more to prevent unauthorized access, data theft, network misuse, device and data modification. CompTIA’s Network+ certification is an entry level vendor neutral certification for aspiring system and network administrators. The Network+ course provides basic training in managing, maintaining, troubleshooting, installing and configuring a network infrastructure.

What you’ll learn
  • Live Class Practical Oriented Training
  • 35 + Hrs Project Work & Assignment
  • Timely Doubt Resolution
  • Dedicated Student Success Mentor
  • Certification & Job Assistance
  • Free Access to Workshop & Webinar
  • No Cost EMI Option
  • Identify characteristics of a variety of network protocols. Identify the components of a LAN implementation.
  • Identify the components of a WAN implementation. Identify major issues and technologies in network security.
  • Identify the components of a remote network implementation. Identify major issues and technologies in disaster recovery.
  • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
  • Identify the components of a WAN implementation. Identify major issues and technologies in network security.
  • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational s...
  • Implement secure network architecture concepts and systems design
  • Install and configure identity and access services, as well as management controls
  • Implement and summarize risk management best practices and the business impact
  • Install and configure wireless security settings and implement public key infrastructure

Covering Topics

1
Part-1: Network +

2
Part-2: Security +

Curriculum

      Part-1: Network +
    Lecture 1: Ports and protocols 
    ·      Protocols and ports
    
    ·      Protocol types
    
    ·      Connection-oriented vs. connectionless
    
    ·      Practical Exercise
    
    Lecture 2: Devices, applications, protocols & services 
    ·      Layer 1- Physical
    
    ·      Layer 2- Data link
    
    ·      Layer 3- Network
    
    ·      Layer 4- Transport
    
    ·      Layer 5- Session
    
    ·      Layer 6- Presentation
    
    ·      Layer 7- Application
    
    ·      Practical Exercise   
    
    Lecture 3: Routing and switching 
    ·      Properties of network traffic
    
    ·      Segmentation and interface properties
    
    ·      Routing
    
    ·      1Pv6 concepts
    
    ·      Performance concepts
    
    ·      NAT/PAT
    
    ·      Port forwarding
    
    ·      Access control list
    
    ·      Distributed switching
    
    ·      Packet-switched vs. circuit
    
    ·      Switched network
    
    ·      Software-defined networking
    
    ·      Practical Exercise
    
    Lecture 4: Appropriate IP addressing components 
    ·      Private  vs. public
    
    ·      Loop back and reserved
    
    ·      Default  gateway
    
    ·      Virtual  IP
    
    ·      Subnet  mask
    
    ·      Subnetting
    
    ·      Address assignments
    
    ·      Practical Exercise
    
    Lecture 5: Network topologies, types and technologies 
    ·      Wired  topologies
    
    ·      Types 
    
    ·      Technologies  that  facilitate the Internet of Things (loT)
    
    ·      Wireless  topologies
    
    ·      Practical Exercise 
    
    Lecture 6: Appropriate wireless technologies & configurations 
    ·      802.11 standards
    
    ·      Cellula
    
    ·      Frequencies
    
    ·      Speed and distance  requirements
    
    ·      Channel bandwidth
    
    ·      Channel bonding
    
    ·      MIMO/MU-MIMO
    
    ·      Unidirectional/omnidirectional
    
    ·      Site surveys
    
    ·      Practical Exercise                
    
    Lecture 7: Cloud concepts 
    ·      Types of services
    
    ·      Cloud delivery models
    
    ·      Connectivity methods
    
    ·      Security implications/considerations
    
    ·      Relationship between  local and cloud resources
    
    ·      Practical Exercise                   
    
    Lecture 8: Functions of network services 
    ·      DNS  service
    
    ·      DHCP  service
    
    ·      NTP
    
    ·      IPAM
    
    ·      Practical Exercise 
    
    Lecture 9: Deploy the appropriate cabling solution 
    ·      Media types
    
    ·      Plenum vs. PVC
    
    ·      Connector  types
    
    ·      Transceivers
    
    ·      Termination   points
    
    ·      Copper cable standards
    
    ·      Copper termination  standards
    
    ·      Ethernet  deployment standards
    
    ·      Practical Exercise                
    
    Lecture 10: Appropriate placement of networking devices 
    ·      Firewall
    
    ·      Router
    
    ·      Switch
    
    ·      Hub   
    
    ·      Bridge
    
    ·      Modems
    
    ·      Wireless  access point
    
    ·      Media converter
    
    ·      Wireless  range extender
    
    ·      VoIP endpoint
    
    ·      Practical Exercise          
    
    Lecture 11: Advanced Networking devices 
    ·      Multilayer switch
    
    ·      Proxy server
    
    ·      NGFW/Layer 7 firewall
    
    ·      Wireless  controller
    
    ·      VPN concentrator
    
    ·      VoIP PBX
    
    ·      Load balancer
    
    ·      IDS/IPS         
    
    ·      AANRADIUS server
    
    ·      UTM appliance          
    
    ·      VoIP gateway
    
    ·      Content  filter
    
    ·      Practical Exercise           
    
    Lecture 12: Virtualization & network storage technologies 
    ·      Virtual  networking components
    
    ·      Network  storage  types
    
    ·      Connection  type
    
    ·      Jumbo frame
    
    ·      Practical Exercise              
    
    Lecture 13: WAN technologies 
    ·      Service type
    
    ·      Transmission  mediums
    
    ·      Characteristics of service
    
    ·      Termination
    
    ·      Practical Exercise
    
    Lecture 14: Documentation & diagrams 
    ·      Diagram symbols
    
    ·      Standard operating procedures/work instructions
    
    ·      Logical vs. physical diagrams
    
    ·      Rack diagrams
    
    ·      Change management documentation
    
    ·      Wiring and port locations
    
    ·      IDF/MDF documentation
    
    ·      Labelling
    
    ·      Network configuration and performance baselines
    
    ·      Inventory management
    
    ·      Practical Exercise                      
    
    Lecture 15: Business continuity & disaster recovery concepts 
    ·      Availability concepts
    
    ·      Recovery
    
    ·      MTBF
    
    ·      SLA  requirements
    
    ·      Practical Exercise                 
    
    Lecture 16: Scanning, monitoring and patching 
    ·      Processes
    
    ·      Event management
    
    ·      Metrics
    
    ·      SNMP monitors
    
    ·      Practical Exercise                      
    
    Lecture 17: Remote access methods 
    ·      VPN
    
    ·      RDP
    
    ·      SSH
    
    ·      VNC
    
    ·      Telnet
    
    ·      HTTPS/management  URL
    
    ·      Remote tile access
    
    ·      Out-of-band  management
    
    ·      Practical Exercise                 
    
    Lecture 18: Identify policies and best practices 
    ·      Privileged  user agreement
    
    ·      Password  policy
    
    ·      On-boarding/off-boarding procedures
    
    ·      Licensing  restrictions
    
    ·      International  export  controls
    
    ·      Data loss prevention
    
    ·      Remote access policies
    
    ·      Incident response  policies
    
    ·      BYOD
    
    ·      AUP
    
    ·      NDA
    
    ·      System life cycle
    
    ·      Safety procedures  and policies
    
    ·      Practical Exercise
    
    Lecture 19: Physical security devices 
    ·      Detection
    
    ·      Prevention
    
    ·      Practical Exercise                  
    
    Lecture 20: Authentication and access controls 
    ·      Authorization, authentication and accounting
    
    ·      Multi factor authentication
    
    ·      Access control
    
    ·      Practical Exercise            
    
    Lecture 21: Secure a basic wireless network 
    ·      WPA
    
    ·      WPA2
    
    ·      TKIP-RC4
    
    ·      CCMP-AES
    
    ·      Authentication  and authorization
    
    ·      Geofencing 
    
    ·      Practical Exercise              
    
    Lecture 22: Summarize common networking attacks 
    ·      Dos
    
    ·      Rogue access point
    
    ·      Spoofing
    
    ·      Evil twin
    
    ·      Deauthentication
    
    ·      War-driving
    
    ·      Brute force
    
    ·      Phishing
    
    ·      VLAN hopping
    
    ·      Social engineering
    
    ·      Ransomware
    
    ·      Man-in-the-middle
    
    ·      Insider  threat
    
    ·      DNS poisoning
    
    ·      Exploits  vs. vulnerabilities
    
    ·      Logic bomb
    
    ·      ARP poisoning   
    
    ·      Practical Exercise                   
    
    Lecture 23: Network device hardening 
    ·      Changing  default  credentials
    
    ·      Avoiding  common  passwords
    
    ·      Upgrading  firmware
    
    ·      Patching  and updates
    
    ·      File hashing
    
    ·      Disabling  unnecessary  services
    
    ·      Using secure protocols
    
    ·      Generating  new keys
    
    ·      Disabling  unused ports
    
    ·      Practical Exercise                      
    
    Lecture 24: Common mitigation techniques 
    ·      Signature  management
    
    ·      Device hardening
    
    ·      Change native  VLAN
    
    ·      Switch  port  protection
    
    ·      Network  segmentation
    
    ·      Privileged  user account
    
    ·      File integrity  monitoring
    
    ·      Role separation
    
    ·      Restricting  access via ACLs
    
    ·      Honeypot/honeynet
    
    ·      Penetration   testing
    
    ·      Practical Exercise
    
    Lecture 25: Network troubleshooting methodology 
    ·      Identify the problem
    
    ·      Establish a theory of probable cause
    
    ·      Test the theory to determine the cause
    
    ·      Document findings, actions, and outcomes
    
    ·      Establish a plan of action
    
    ·      Implement the solution or escalate as necessary
    
    ·      Verify full system functionality
    
    ·      Practical Exercise      
    
    Lecture 26: Appropriate tool 
    ·      Hardware tools
    
    ·      Software tools
    
    ·      Practical Exercise           
    
    Lecture 27: Common wired connectivity & performance issues 
    ·      Attenuation
    
    ·      Latency
    
    ·      Jitter
    
    ·      Crosstalk
    
    ·      EMI
    
    ·      Open/short
    
    ·      Incorrect  pin-out
    
    ·      Incorrect  cable type
    
    ·      Bad port
    
    ·      Transceiver  mismatch
    
    ·      TX/RX reverse
    
    ·      Duplex/speed   mismatch
    
    ·      Damaged cables
    
    ·      Bent pins
    
    ·      Bottlenecks
    
    ·      VLAN mismatch
    
    ·      Network  connection   LED status  indicators
    
    ·      Practical Exercise      
    
    Lecture 28: Common wireless connectivity & performance issues 
    ·      Reflection
    
    ·      Refraction
    
    ·      Absorption
    
    ·      Latency         
    
    ·      Jitter
    
    ·      Attenuation
    
    ·      Incorrect antenna type
    
    ·      Interference
    
    ·      Incorrect antenna placement
    
    ·      Channel overlap
    
    ·      Overcapacity
    
    ·      Distance limitations
    
    ·      Frequency mismatch
    
    ·      Wrong SSID
    
    ·      Wrong passphrase
    
    ·      Security type mismatch
    
    ·      Power levels
    
    ·      Signal-to-noise ratio
    
    ·      Practical Exercise
    
    Lecture 29: Common network service issues 
    ·      Names not resolving
    
    ·      Incorrect gateway
    
    ·      Incorrect netmask
    
    ·      Duplicate IP addresses
    
    ·      Duplicate MAC addresses
    
    ·      Expired  IP address
    
    ·      Rogue DHCP server
    
    ·      Untrusted SSL certificate
    
    ·      Incorrect  time
    
    ·      Exhausted  DHCP scope
    
    ·      Blocked TCP/UDP ports
    
    ·      Incorrect host-based firewall settings
    
    ·      Incorrect ACL settings
    
    ·      Unresponsive service
    
    ·      Hardware failure
    
    ·      Practical Exercise
      Part-2: Security +
    Lecture 30: Social engineering techniques 
    ·      Phishing
    
    ·      Smishing
    
    ·      Vishing
    
    ·      Spam
    
    ·      Spam over Internet messaging (SPIM)
    
    ·      Spear phishing
    
    ·      Dumpster diving
    
    ·      Shoulder surfing
    
    ·      Pharming
    
    ·      Tailgating
    
    ·      Eliciting information
    
    ·      Whaling
    
    ·      Prepending
    
    ·      Identity fraud
    
    ·      Invoice scams
    
    ·      Credential harvesting
    
    ·      Reconnaissance
    
    ·      Hoax
    
    ·      Impersonation
    
    ·      Watering hole attack
    
    ·      Typo squatting
    
    ·      Pretexting
    
    ·      Influence campaigns
    
    ·      Principles (reasons for effectiveness)
    
    ·      Practical Exercise
    
    Lecture 31: Type of attack 
    ·      Malware    
    
    ·      Password attacks   
    
    ·      Adversarial artificial intelligence (AI)
    
    ·      Physical attacks
    
    ·      Supply-chain attacks
    
    ·      Cloud-based vs. on-premises attacks
    
    ·      Cryptographic attacks
    
    ·      Practical Exercise        
    
    Lecture 32: Potential indicators associated with application attacks 
    ·      Privilege escalation
    
    ·      Cross-site scripting
    
    ·      Injections
    
    ·      Pointer/object dereference
    
    ·      Directory traversal
    
    ·      Buffer overflows
    
    ·      Race conditions
    
    ·      Error handling
    
    ·      Improper input handling
    
    ·      Replay attack
    
    ·      Integer overflow
    
    ·      Request forgeries
    
    ·      Application programming interface (API) attacks
    
    ·      Resource exhaustion
    
    ·      Memory leak
    
    ·      Secure sockets layer (SSL) stripping
    
    ·      Driver manipulation
    
    ·      Pass the hash
    
    ·      Practical Exercise        
    
    Lecture 33: Potential indicators associated with network attacks 
    ·      Wireless                 
    
    ·      Man-in-the-browser
    
    ·      Man-in-the-middle
    
    ·      Layer 2 attacks      
    
    ·      Distributed denial-of-service (DDoS)
    
    ·      Malicious code or script execution
    
    ·      Domain name system (DNS)
    
    ·      Practical Exercise
    
    Lecture 34: Threat actors, vectors & intelligence sources 
    ·      Actors and threats
    
    ·      Attributes of actors
    
    ·      Vectors
    
    ·      Threat intelligence sources
    
    ·      Research sources
    
    ·      Practical Exercise
    
    Lecture 35: Security concerns associated with types of vulnerabilities 
    ·      Cloud-based vs. on-premises vulnerabilities
    
    ·      Zero-day
    
    ·      Weak configurations
    
    ·      Third-party risks
    
    ·      Improper or weak patch management
    
    ·      Legacy platforms
    
    ·      Impacts
    
    ·      Practical Exercise        
    
    Lecture 36: Techniques used in security assessments 
    ·      Threat hunting
    
    ·      Vulnerability scans
    
    ·      Syslog/Security information and event management (SIEM)
    
    ·      Security orchestration, automation, and response (SOAR)
    
    ·      Practical Exercise
    
    Lecture 37: Techniques used in penetration testing 
    ·      Penetration testing
    
    ·      Passive and active reconnaissance
    
    ·      Exercise types
    
    ·      Practical Exercise
    
    Lecture 38: Security concepts in an enterprise environment 
    ·      Configuration management           
    
    ·      Hardware security module (HSM)
    
    ·      Deception and disruption
    
    ·      Data sovereignty
    
    ·      Data protection
    
    ·      Geographical considerations
    
    ·      Cloud access security broker (CASB)
    
    ·      Response and recovery controls
    
    ·      Secure Sockets Layer (SSL)
    
    ·      Transport Layer Security (TLS) inspection
    
    ·      Hashing
    
    ·      API considerations
    
    ·      Site resiliency
    
    ·      Practical Exercise
    
    Lecture 39: Virtualization & cloud computing concepts 
    ·      Cloud models
    
    ·      Cloud service providers
    
    ·      Managed service provider (MSP)
    
    ·      Managed security service provider (MSSP)
    
    ·      On-premises vs. off-premises
    
    ·      Fog computing
    
    ·      Edge computing
    
    ·      Thin client
    
    ·      Containers
    
    ·      Microservices/API
    
    ·      Infrastructure as code
    
    ·      Serverless architecture
    
    ·      Services integration
    
    ·      Resource policies
    
    ·      Transit gateway
    
    ·      Virtualization
    
    ·      Practical Exercise
    
    Lecture 40: Secure application development, deployment, & automation concepts 
    ·      Environment
    
    ·      Provisioning and deprovisioning
    
    ·      Integrity measurement
    
    ·      Secure coding techniques
    
    ·      Open Web Application Security Project (OWASP)
    
    ·      Software diversity
    
    ·      Automation/scripting
    
    ·      Elasticity
    
    ·      Scalability
    
    ·      Version control
    
    ·      Practical Exercise
    
    Lecture 41:Authentication & authorization design concepts 
    ·      Authentication methods    
    
    ·      Biometrics 
    
    ·      Multifactor authentication (MFA) factors and attributes
    
    ·      Authentication, authorization, and accounting (AAA)
    
    ·      Cloud vs. on-premises requirements
    
    ·      Practical Exercise        
    
    Lecture 42: Implement cyber security resilience 
    ·      Redundancy          
    
    ·      Replication
    
    ·      On-premises vs. cloud
    
    ·      Backup types
    
    ·      Non-persistence
    
    ·      High availability
    
    ·      Restoration order
    
    ·      Diversity
    
    ·      Practical Exercise
    
    Lecture 43: Security implications of embedded & specialized systems 
    ·      Embedded systems
    
    ·      Supervisory control & data acquisition(SCADA)
    
    ·      Industrial control system (ICS)
    
    ·      Internet of Things (IoT)
    
    ·      Specialized
    
    ·      Voice over IP (VoIP)
    
    ·      Heating, ventilation, air conditioning (HVAC)
    
    ·      Drones/AVs
    
    ·      Multifunction printer (MFP)
    
    ·      Real-time operating system (RTOS)
    
    ·      Surveillance systems
    
    ·      System on chip (SoC)
    
    ·      Communication considerations
    
    ·      Constraints
    
    ·      Practical Exercise
    
    Lecture 44: Physical security controls 
    ·      Bollards/barricades
    
    ·      Mantraps
    
    ·      Badges
    
    ·      Alarms
    
    ·      Signage
    
    ·      Cameras
    
    ·      Closed-circuit television (CCTV)
    
    ·      Industrial camouflage
    
    ·      Personnel
    
    ·      Locks
    
    ·      USB data blocker
    
    ·      Lighting
    
    ·      Fencing
    
    ·      Fire suppression
    
    ·      Sensors
    
    ·      Drones/UAV
    
    ·      Visitor logs
    
    ·      Faraday cages
    
    ·      Air gap
    
    ·      Demilitarized zone (DMZ)
    
    ·      Protected cable distribution
    
    ·      Secure areas
    
    ·      Secure data destruction
    
    ·      Practical Exercise        
    
    Lecture 45: Basics of cryptographic concepts 
    ·      Digital signatures
    
    ·      Key length
    
    ·      Key stretching
    
    ·      Salting
    
    ·      Hashing
    
    ·      Key exchange
    
    ·      Elliptic-curve cryptography
    
    ·      Perfect forward secrecy
    
    ·      Quantum
    
    ·      Post-quantum
    
    ·      Ephemeral
    
    ·      Modes of operation
    
    ·      Blockchain
    
    ·      Cipher suites
    
    ·      Symmetric vs. asymmetric
    
    ·      Lightweight cryptography
    
    ·      Steganography
    
    ·      Homomorphic encryption
    
    ·      Common use cases
    
    ·      Limitations
    
    ·      Practical Exercise
    
    Lecture 46: Implement secure protocols 
    ·      Protocols
    
    ·      Use cases
    
    ·      Practical Exercise
    
    Lecture 47: Implement host or application security solutions 
    ·      Endpoint protection
    
    ·      Boot integrity
    
    ·      Database
    
    ·      Application security
    
    ·      Hardening
    
    ·      Self-encrypting drive (SED)/ full-disk encryption (FDE)
    
    ·      Hardware root of trust
    
    ·      Trusted Platform Module (TPM)
    
    ·      Sandboxing
    
    ·      Practical Exercise
    
    Lecture 48: Implement secure network designs 
    ·      Load balancing      
    
    ·      Out-of-band management
    
    ·      Network segmentation
    
    ·      Virtual private network (VPN)
    
    ·      DNS
    
    ·      Network access control (NAC)
    
    ·      Port security
    
    ·      Network appliances
    
    ·      Access control list (ACL)
    
    ·      Route security
    
    ·      Quality of service (QoS)
    
    ·      Implications of IPv6
    
    ·      Port spanning/port mirroring
    
    ·      Monitoring services
    
    ·      File integrity monitors
    
    ·      Practical Exercise        
    
    Lecture 49: Wireless security settings 
    ·      Cryptographic protocols
    
    ·      Authentication protocols
    
    ·      Methods
    
    ·      Installation considerations
    
    ·      Practical Exercise
    
    Lecture 50: Secure mobile solutions 
    ·      Connection methods and receivers
    
    ·      Mobile device management (MDM)
    
    ·      Mobile devices
    
    ·      Enforcement and monitoring
    
    ·      Deployment models
    
    ·      Practical Exercise
    
    Lecture 51: Cyber security solutions to the cloud 
    ·      Cloud security controls
    
    ·      Solutions
    
    ·      Cloud native controls vs. third-party solutions
    
    ·      Practical Exercise        
    
    Lecture 52: Identity & account management controls 
    ·      Identity
    
    ·      Account types
    
    ·      Account policies
    
    ·      Practical Exercise
    
    Lecture 53: Authentication and authorization solutions 
    ·      Authentication management
    
    ·      Authentication
    
    ·      Access control schemes
    
    ·      Practical Exercise
    
    Lecture 54: Public key infrastructure 
    ·      Public key infrastructure (PKI)     
    
    ·      Types of certificates
    
    ·      Certificate formats
    
    ·      Concepts
    
    ·      Practical Exercise
    
    Lecture 55: Appropriate tool to assess organizational security 
    ·      Network reconnaissance and discovery
    
    ·      File manipulation
    
    ·      Shell and script environments
    
    ·      Packet capture and replay
    
    ·      Forensics
    
    ·      Exploitation frameworks
    
    ·      Password crackers
    
    ·      Data sanitization
    
    ·      Practical Exercise
    
    Lecture 56: Policies, processes, & procedures for incident response 
    ·      Incident response plans
    
    ·      Incident response process
    
    ·      Exercises   
    
    ·      Stakeholder management
    
    ·      Attack frameworks
    
    ·      Communication plan
    
    ·      Disaster recovery plan
    
    ·      Business continuity plan
    
    ·      Continuity of operations planning (COOP)
    
    ·      Incident response team
    
    ·      Retention policies
    
    ·      Practical Exercise
    
    Lecture 57: Appropriate data sources to support an investigation 
    ·      Vulnerability scan output
    
    ·      SIEM dashboards
    
    ·      Log files
    
    ·      syslog/rsyslog/syslog-ng
    
    ·      journalctl
    
    ·      nxlog
    
    ·      Retention
    
    ·      Bandwidth monitors
    
    ·      Metadata
    
    ·      Netflow/sflow
    
    ·      Protocol analyzer output
    
    ·      Practical Exercise
    
    Lecture 58: Mitigation techniques or controls 
    ·      Reconfigure endpoint security solutions
    
    ·      Isolation
    
    ·      Containment
    
    ·      Segmentation
    
    ·      SOAR
    
    ·      Practical Exercise
    
    Lecture 59: Key aspects of digital forensics 
    ·      Documentation/evidence
    
    ·      Acquisition
    
    ·      On-premises vs. cloud
    
    ·      Integrity
    
    ·      Preservation
    
    ·      E-discovery
    
    ·      Data recovery
    
    ·      Non-repudiation
    
    ·      Strategic intelligence/counter intelligence
    
    ·      Practical Exercise
    
    Lecture 60: Types of controls 
    ·      Category    
    
    ·      Control type
    
    ·      Practical Exercise
    
    Lecture 61: Applicable regulations, standards, or framework 
    ·      Regulations, standards, and legislation
    
    ·      Key frameworks
    
    ·      Benchmarks /secure configuration guides
    
    ·      Practical Exercise
    
    Lecture 62: Importance of policies to organizational security 
    ·      Personnel
    
    ·      Diversity of training techniques
    
    ·      Third-party risk management
    
    ·      Data
    
    ·      Credential policies
    
    ·      Organizational policies
    
    ·      Practical Exercise
    
    Lecture 63: Risk management processes & concepts 
    ·      Risk types
    
    ·      Risk management strategies
    
    ·      Risk analysis
    
    ·      Disasters
    
    ·      Business impact analysis
    
    ·      Practical Exercise
    
    Lecture 64: Privacy & sensitive data concepts 
    ·      Organizational consequences of privacy breaches
    
    ·      Notifications of breaches
    
    ·      Data types
    
    ·      Privacy enhancing technologies
    
    ·      Roles and responsibilities
    
    ·      Information life cycle
    
    ·      Impact assessment
    
    ·      Terms of agreement
    
    ·      Privacy notice
    
    ·      Practical Exercise

Frequently Asked Questions

There are no specific prerequisites to take up this certification.

The course offers a variety of online training options, including: Live Virtual Classroom Training: Participate in real-time interactive sessions with instructors and peers. 1:1 Doubt Resolution Sessions: Get personalized assistance and clarification on course-related queries. Recorded Live Lectures*: Access recorded sessions for review or to catch up on missed classes. Flexible Schedule: Enjoy the flexibility to learn at your own pace and according to your schedule.

Live Virtual Classroom Training allows you to attend instructor-led sessions in real-time through an online platform. You can interact with the instructor, ask questions, participate in discussions, and collaborate with fellow learners, simulating the experience of a traditional classroom setting from the comfort of your own space.

If you miss a live session, you can access recorded lectures* to review the content covered during the session. This allows you to catch up on any missed material at your own pace and ensures that you don't fall behind in your learning journey.

The course offers a flexible schedule, allowing you to learn at times that suit you best. Whether you have other commitments or prefer to study during specific hours, the course structure accommodates your needs, enabling you to balance your learning with other responsibilities effectively. *Note: Availability of recorded live lectures may vary depending on the course and training provider.