Certified Cyber-Security Specialist

Vero eos et accusam et justo duo dolores et ea rebum. Stet clita kasd gubergren, no sea takimata sanctus est Lorem ipsum dolor sit amet.

Overview

Information security individuals who are trained in protecting, detecting and responding to threats on the network. Information security individuals are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This training will prepare students with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that they understand how networks operate, understand what software automating is and how to analyze the subject material. In addition, network defense fundamentals, application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help information security individuals design greater network security policies and successful incident response plans.

Who Should Attend

  • IT professionals wanting to transition their career into Cyber-Security.
  • Anyone needing a robust introduction to Cyber-Security.
  • Anyone planning to work in a position that requires Cyber-Security knowledge.
  • Anyone with Information Security / Cyber-Security responsibilities.
  • Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge.
  • Professionals familiar with basic IT and Information Security concepts and who need to round out their knowledge.

Prerequisites

This training does not impose any prerequisites, however, we recommend that candidates have at least 1 year of IT administration experience.

Course Outline

  • Cyber-Security Essentials
  • Understanding Current Threats Landscape
  • New Age Threats
  • Reconnaissance
  • Vulnerability Management
  • Monitoring & Defending Against Advanced
  • Attacks
  • Advanced Security Operations
  • Introduction to Security Incident & Incident
  • Handling
  • Log Analysis

Course Summary

Class Duration
40 Hrs (2 1/2 months)
Faculty
Technology
Level
Advance
Entry Requirements
Contact Now
Enroll Today

We show our students that there are no barriers to their success. There are opportunities waiting for you right here at AIMS because we understand that your ambition will only keep growing. Just like our passion for excellence.

Enroll Now