Cyber Security ‚Äč

THREATS, ATTACKS & VULNERABILITIES
Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts

WINDOWS OPERATING SYSTEMS TECHNOLOGIES & TOOLS
Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security

SOFTWARE TROUBLESHOOTING ARCHITECTURE & DESIGN
Implement secure network architecture concepts and systems design

NETWORKING IDENTITY & ACCESS MANAGEMENT
Install and configure identity and access services, as well as management controls

HARDWARE & NETWORK TROUBLESHOOTING RISK MANAGEMENT
Implement and summarize risk management best practices and the business impact

SECURITY CRYPTOGRAPHY & PKI
Install and configure wireless security settings and implement public key infrastructure

Close Bitnami banner
Bitnami