Course Details
Topic 1 Security Operations
- Operating system (OS) security
- Logging
- Infrastructure concepts
- Network security
- Identity and access management
- Encryption
- Sensitive date protection
- Indicators of malicious activity
- Tools and techniques
- Email analysis
- Programming and scripting
- Understanding cybersecurity threats
- Threat intelligence
- Efficiency and process improvement
Topic 2 Vulnerability Management
- Creating a vulnerability management program
- Network mapping
- Configuring and executing vulnerability scans
- Analyzing scan results
- Common vulnerability
- Software security issues
- Specialized technology vulnerabilities
- More cybersecurity tools
- Software development lifecycle
- Secure coding practices
- Software quality assurance
- Threat modeling
- Security governance
- Risk management
Topic 3 Incident Response and Management
- Incident response programs
- Attack frameworks
- Incident investigation
- Forensic techniques
- Business continuity
- Disaster discovery
Topic 4 Reporting and Communication
- Vulnerability reporting and communication
- Incident reporting and communication
Course Info
Job Roles
- Cybersecurity Analyst
- Information Security Analyst
- Network Security Specialist
- Threat Intelligence Analyst
- IT Security Consultant
- Vulnerability Analyst
- Incident Response Coordinator
- Security Operations Center (SOC) Analyst
- Compliance and Auditing Officer
- Risk Analyst
- Cyber Defense Analyst
- IT Security Engineer
- Penetration Tester
- Forensics Analyst
- Security Systems Administrator
- IT Security Trainer
- Security Policy Analyst
- Cybersecurity Researcher
- Cybersecurity Manager
- Information Systems Security Officer
Trainers
Man Guo Chang: Man Guo Chang graduated from Nanyang Technological University, School of Electrical and Electronic Engineering, major in Computer Engineering.
He has more than 25 years of working experience in the Semiconductor field, specialized in IC Testing, Inline Electrical Testing, Product & Yield Engineering, Data Analysis, System Engineering, and Software Development. He is also an ACTA certified trainer, currently providing STEM training to adult learners in the area of Computer Vision, Internet of Things, Embedded Electronics, and Python Programming.
Customer Reviews (4)
- Very good Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment