================================
Course Duration : 3 Months (24 Classes)
Class Duration : 50 Minute Online Class
Class Timiings : 2 Days in Week evening (Sat, Sun).
Discounted Fee for Saudi Students: $1500 (SAR 5600)
(Advance 50%, Remaining in 3 Installments)
Payment Method : By Bank Transfer.
Certificate will be provided on completion of course (sample certificate is attached).
Thanks
WhatsApp +923175484879
Email : [email protected]
https://www.kftechsols.com/ ...
@ Contents at a Glance :
=====================
Domain 1: General Security Concepts :
1. Compare and contrast various types of security controls
2. Summarize fundamental security concepts
3. Explain the importance of change management processes and the impact to security
4. Explain the importance of using appropriate cryptographic solutions
Domain 2: Threats, Vulnerabilities, and Mitigations :
5. Compare and contrast common threat actors and motivations
6. Explain common threat vectors and attack surfaces
7. Explain various types of vulnerabilities
8. Given a scenario, analyze indicators of malicious activity
9. Explain the purpose of mitigation techniques used to secure the enterprise
Domain 3: Security Architecture :
10. Compare and contrast security implications of different architecture models
11. Given a scenario, apply security principles to secure enterprise infrastructure
12. Compare and contrast concepts and strategies to protect data
13. Explain the importance of resilience and recovery in security architecture
Domain 4: Security Operations :
14. Given a scenario, apply common security techniques to computing resources
15. Explain the security implications of proper hardware, software, and data asset management
16. Explain various activities associated with vulnerability management
17. Explain security alerting and monitoring concepts and tools
18. Given a scenario, modify enterprise capabilities to enhance security
19. Given a scenario, implement and maintain identity and access management
20. Explain the importance of automation and orchestration related to secure operations
21. Explain appropriate incident response activities
22. Given a scenario, use data sources to support an investigation
Domain 5: Security Program Management and Oversight :
23. Summarize elements of effective security governance
24. Explain elements of the risk management process
25. Explain the processes associated with third-party risk assessment and management