- Duration: 3 Hours
Course details
- Research and testing are the backbone of introducing new technologies and devices into your network. It is important to make sure none of the new changes will compromise network security. In this course, you'll learn about research methods to determine industry trends and their impact to the enterprise.You will also explore methods of securing an enterprise environment, and you will select methods or tools appropriate to conduct an assessment and analyze the results. This course is one of a series in the Skillsoft learning path that covers the objectives for the CompTIA Advanced Security Practitioner (CAS-002) certification exam.
- start the course
- identify the best practices and new technologies for dealing with new systems
- identify how client-side attacks, vulnerabilities, and threats affect network security
- define how zero-day and emergent threats can affect network security
- define how end-user cloud storage and business integration can affect network security
- identify the role of the CERT team and what members should be on it
- define how conventions, threats actors, and threat intelligence are used to create network security
- define the role RFPs, RFQs, FRIs, and agreements play in network security
- identify how benchmarks and baselines are used to create network security
- define how prototypes and testing are used to create network security
- define how cost benefit analysis is used when creating network security plans
- identify how metrics collection and analysis is used when creating network security plans
- identify how trend data and cyber defense are used when creating network security
- define the role existing security controls play when creating network security
- identify how reverse engineering can be used in order to create network security
- define how performance, latency, scalability, and capability affect network security
- define how usability, maintainability, availability, and recovery affect network security
- identify how lessons learned and after-action reports are used to reinforce network security
- define how judgment calls are used when network security issues arise
- define how network analysis tools are used when securing network environments
- identify how exploitation tools can be used both to test and exploit network environments
- define how passive reconnai
About New Horizons Lebanon
As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. With over 300 centers in 60 countries, New Horizons is the world’s largest independent IT and Business training company. Over the past 35 years, New Horizons has delivered a full range of IT and business skills/Management training through innovative learning methods that have transformed businesses and helped over 35 million students reach their goals. New Horizons Lebanon branch was established in 1996.
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Cyber Security Law Online Apex LearningUSD 24
USD 240Duration: Upto 11 Hours - CompTIA Linux+ Certification John AcademyUSD 74
USD 1,580Duration: Upto 19 Hours