This course delivers a step-by-step methodology for securing any infrastructure through enhanced defenses to the core components of networks and databases.
Understand the utility and application of network monitoring tools
Become familiar with tools and best practices for securing Windows-based infrastructure and LINUX/UNIX systems
Review key steps to securing databases based on MYSQL, Microsoft SQL, and Oracle
About this course:
Cyber-based attacks and data breaches are threats to any organization, however, effective defense mechanisms are seldom well understood or applied. This course delivers a step-by-step methodology for securing any infrastructure through enhanced defenses to the core components of networks and databases; this approach integrates cyber threat and risk management, defense-in-depth, network monitoring, cloud and mobile devices. Designed for security and IT professionals, students, technical users, management and anyone seeking an understanding of the key principles of cyber defense, this course also provides effective strategies for security testing, mitigating insider threats and recovering from security incidents. Current events case studies will illuminate key concepts, and cyber defense techniques will be demonstrated in computer and DIY device (BeagleBone) labs. The final project will enable students to apply the methodology to secure infrastructures of their choice.
We use cookies to understand how you use our site and to improve your experience, including personalizing content and to store your content preferences. By continuing to use our site, you accept our use of cookies.
Read our privacy policy.