2 395 € / 59 900 Kč


5 days

Delivery Methods

VILT / Private Group

This course is also available in the VODL (Self-Paced eLearning) method. Please contact us for details on ordering options and pricing.

In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.

Upcoming Class Dates and Times

Start Date Location Delivery Price
Mon 26.02.2024 15:00 CET Prague, Czech Republic VILT G2R English
59,900.00 Kč
Mon 20.05.2024 15:00 CET Prague, Czech Republic VILT G2R English
59,900.00 Kč

Delivery methods

VILT LIVE Virtual Instructor-Led Training (VILT)

TILT Traditional Instructor-Led Training (TILT)

G2R Guaranteed to Run Class

Who Should Attend

This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience.

Prerequisite Courses Recommended

  • CompTIA Cybersecurity Analyst (CySA+) Certification
  • CompTIA Security+ Certification

Course Objectives

Upon successful completion of this course, students will be able to:

  • identify enterprise security fundamentals.
  • apply enterprise security technology solutions.
  • implement security design and solutions.
  • manage risk, policies and procedures within an enterprise..
  • integrate security solutions within an enterprise.
  • conduct security research and analysis.


  1. Enterprise Security Architecture
    • The Basics of Enterprise Security
    • The Enterprise Structure
    • Enterprise Security Requirements
  2. Enterprise Security Technology
    • Common Network Security Components and Technologies
    • Communications and Collaboration Security
    • Cryptographic Tools and Techniques
    • Advanced Authentication
  3. Enterprise Resource Technology
    • Enterprise Storage Security Issues
    • Distributed, Shared, and Virtualized Computing
    • Cloud Computing and Security
  4. Security Design and Solutions
    • Network Security Design
    • Conduct a Security Assessment
    • Host Security
  5. Application Security Design
    • Application Security Basics
    • Web Application Security
  6. Managing Risk, Security Policies, and Security Procedures
    • Analyze Security Risk
    • Implement Risk Mitigation Strategies and Controls
    • Implement Enterprise-Level Security Policies and Procedures
    • Prepare for Incident Response and Recovery
  7. Enterprise Security Integration
    • The Technology Life Cycle
    • Inter-Organizational Change
    • Integrate Enterprise Disciplines to Achieve Secure Solutions
  8. Security Research and Analysis
    • Perform an Industry Trends and Impact Analysis
    • Perform an Enterprise Security Analysis