InfoSec: Cybersecurity

Learn to Install, configure and administer a Windows Server in an enterprise environment. You will manage advanced network features in Windows Server 2016, Including but not limited to VPN, Remote Desktop Services Dynamic Host Configuration Protocol (DHCP) and Software Defined Networking (SDN).

About Training

In this class, you will learn to manage all aspects of information security engineering and daily operations of enterprise cybersecurity systems. Ability to detect and defend against cyberattacks targeting any organization networks infrastructure.
Responsibilities will also include assessing and managing the cybersecurity risk posture of small, medium, and enterprise networks.
Learn cybersecurity proactive risk management services, including vulnerability scanning, penetration tests, risk assessments, and security audits.
The ability to development and maintenance Information Security Policies and Standards that establish the required behaviors and controls intended to protect business information technology resources, secure personal information, and safeguard the privacy of individuals.
After this class, you will be able to fuse technical and non-technical sources to analyze various cyber threat landscape.

  • Operate and Maintain:

    Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security. These include Customer Service and Technical Support; Data Administration; Knowledge Management; Network Services, Systems Administration; and Systems Analysis.

  • Oversee and Govern:

    Provides leadership, management, direction, or development, and advocacy so the organization may effectively conduct cybersecurity work. These include Cybersecurity Management, Executive Cyber Leadership; Legal Advice and Advocacy; Program/Project Management and Acquisition; Strategic Planning and Policy; and Training, Education, and Awareness.

  • Protect and Defend:

    Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks. This includes Cyber Defense Analysis, Cyber Defense Infrastructure Support; Incident Response; Vulnerability Assessment, and Management.

  • Securely Provision:

    Conceptualizes, designs procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development. This includes Risk Management; Software Development; Systems Architecture; Systems Development; Systems Requirements Planning; Technology R&D; and Test and Evaluation.

  • Investigate:

    Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence. This includes Cyber Investigation and Digital Forensics.

  • Analyze:

    Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. This includes All-Source Analysts; Exploitation Analysis; Language Analysis; Targets; and Threat Analysis.

  • Collect and Operate:

    Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. This includes Collection Operations; Cyber Operational Planning; and Cyber Operations to gather evidence.