- Duration: 3 Hours
Course details
With more and more business success relying on secure and guaranteed access to data, having plans and policies in place to manage risks and recover from disasters is pivotal. This course provides the learner with the knowledge to provide data redundancy and handling incidents and risks. This course teaches the learner how to identify the threats and vulnerabilities that can put information systems at risk and how to optimize a risk assessment and management system to protect resources. It covers risk limitation and mitigation and the security incident handling process. The course covers business continuity planning and shows how to design an effective disaster contingency plan and an optimized data recovery and restoration methodology. This course guides you through the Common Body of Knowledge (CBK) recommended by the International Information Systems Security Certification Consortium (ISC)2 for its Systems Security Certified Practitioner (SSCP) certification. The SSCP credential certifies student expertise in 7 different knowledge domains.
- recognize threats and vulnerabilities that expose information technology systems to risk
- define key risk management concepts
- recognize key factors for improving a risk management system
- specify appropriate risk limitation controls for a particular scenario
- describe a security incident detection and analysis process
- describe a security incident containment and eradication process
- identify key considerations for gathering and handling evidence
- optimize a risk assessment methodology for a particular scenario
- determine appropriate risk and incident handling methods for a particular scenario
- describe a business impact analysis process
- define key business impact analysis concepts
- select an appropriate disaster recovery site for a particular scenario
- identify key considerations for disaster recovery planning
- describe disaster plan testing methodologies
- identify an appropriate data backup rotation schedule for a particular scenario
- identify features of high-availability and load-balancing clustering
- select an appropriate RAID level for a particular scenario
- optimize a disaster planning process for a particular scenario
- analyze a data backup and restoration methodology
About New Horizons Jordan
- 300 computer training centers in 70 countries (and counting)
- Largest Guaranteed-to-Run ctheirse schedule in the world
- Ranked in the top 5% of the industry for training quality and customer satisfaction
- Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
- Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
- World’s largest Cisco-authorized training partner
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Introduction to TESOL Course CentralUSD 23
USD 100Duration: Upto 1 Hour - Ethical Hacking Diploma QLS Level 5 StudyPlexUSD 23
USD 210Duration: Upto 29 Hours