Course HighlightsCOURSE
Information Security Devices

Information Security Devices

There are many devices that part of a robust network infrastructure. This course focuses in the Installation, configuration and troubleshooting information security devices.

Information Security Devices Highlights

Course Enrollment

Starts on

06 July 2020

Enrollment closes on
31 December 2022

  Course duration

Duration

  • 5 Hours
  Course Fee

Fee

US$ 49 - US$ 99

Course Enrollment

Starts on

06 July 2020

Enrollment closes on
31 December 2022

Course duration

Duration

  • 5 Hours
Course Fee

Fee

US$ 49 - US$ 99

About This Course

Welcome to Information Security Devices. There are two course in this program.

  1. Planning a Security Incident Response
  2. Microsoft Azure Security Services

This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.

Prerequisites

In addition to their professional experience, students who take this training should already have the following technical knowledge:

  • The current cybersecurity ecosystem.
  • Analysis of hacks on computers and networks.
  • Basic Risk Management

Course Objectives

After completing this course students will have the ability to:

  • Effectively prioritize the response to a security incident
  • Build a computer security incident response team (CSIRT)
  • Develop an incident response action plan
  • Post-incident activity

Course Content

This course is designed to get you started as quickly as possible. There are a variety of self-paced learning activities. Scored Questions are located at the end of each module to check your general understanding of the key concepts. Videos are located throughout the course to explain the concepts and provide system walk-throughs. Final Exam: The Final Exam questions are scored and check your understanding of the key concepts in the course. The Final Exam plus the scored questions at the end of each module will count for 100% of your course grade.

Course Outline

Introduction
Cyber Threat Modeling
Stride
The National Institute for Standards and Technology (NIST) Cybersecurity Framework (CSF)
Identify
Protect
Detect
Respond
Incident Response
Prepare
Things to Remember while in an Incident
Recovery Preparations
Lesson Review - Hallmarks of a Strong Response Program
Critical Success Factors
Module 1
Preparation Actions
Team Duties
Team Preparations
Establishing Team Roles
CSIRT Communications
Recovering
Reviewing Response and Updating Policies
Module Summary
Module 2
The Security Incident Report
Introduction
Practice-SIR
Incident-Overview
Disaster Recovery Plan
Assessment Questions
Course Final
About this Course
Course Syllabus
Course Resources
Introduction to Azure Security Architecture
Video Introduction to Azure Network Security
Azure Networking
Network Access Control
Secure Remote Access and Cross Premises Connectivity
The following video discusses Virtual Network Peering.
Availability
Name Resolution
DMZ Architecture
Monitoring and threat detection
Module Summary
What are Review Questions?
Mod 01 Assessment
Azure Security and Operations Management
Dynamic cloud environments
Services in the cloud
Shared Responsibility for Security
Azure DDoS Protection Service - Video
Azure Secure Center
Alert Validation in ASC - Video
Detecting unprotected resources
Security policies and recommendations
Azure Security Center Case Study
Recommended remediation and mitigation steps
Azure Backup – Guard against ransomware and human errors
Videos Azure Backup - Videos
Azure Log Analytics – an important component in an effective data protection strategy
Log Analytics architecture
Types of logs in Azure
Integrating Azure Security Center alerts with Azure log integration
Video Overview of Azure Log Analytics - Video
What are Review Questions?
Mod 02 Assessment
Azure Security Services
Capabilities of the Azure Application Gateway
Video Using Azure Application Gateway - Video
Web Application Firewall
Secure benefits of Azure Web Application Firewall
Web Application Firewall Modes
Summary of Application Gateway
Azure disk encryption and storage encryption
Azure SQL Encryption
Demo Transparent Data Encryption - Part 1 - Video
Demo Transparent Data Encryption - Part 2 - Video
Client Access Always Encrypted
Azure SQL Vulnerability Assessment (VA)
Video Azure SQL Vulnerability Assessment - Video
Summary
What are Review Questions?
Mod 03 Assessment
Enterprise Mobility & Security Services
Microsoft Intune
How Intune Works
Azure Active Directory integration with MDM
MDM Design Considerations
Application Management with Intune
General Data Protect Regulation
Device Health Attestation
Summary MDM & MAM
Security Aspect of Windows AutoPilot
Benefits of Windows AutoPilot
What are Review Questions?
Mod 04 Assessment
Assessment Questions Explained
Final Exam
Course Certificate

Earn your certificate

Once you have completed this course, you will earn your certificate.

Information Security Devices