Szczegółowy program szkolenia
- Information Security Threats and Vulnerabilities
- Information Security Attacks
- Network Security Fundamentals
- Identification, Authentication, and Authorization
- Network Security Controls: Administrative Controls
- Network Security Controls: Physical Controls
- Network Security Controls: Technical Controls
- Network Security Assessment Techniques and Tools
- Application Security
- Virtualization and Cloud Computing
- Wireless Network Security
- Mobile Device Security
- Internet of Things (IoT) and Operational Technology (OT) Security
- Cryptography
- Data Security
- Network Troubleshooting
- Network Traffic Monitoring
- Network Log Monitoring and Analysis
- Incident Response
- Computer Forensics
- Business Continuity and Disaster Recovery
- Risk Management