Price

2 195 € / 54 875 Kč

Duration

5 days

Delivery Methods

VILT / Private Group

In this course, students will examine advanced security concepts, principles, and implementations that pertain to enterprise level security.

Upcoming Class Dates and Times

Start Duration Location Language Delivery
12.12.2022 15:00 CET 5 days Prague, Czech Republic English VILT G2R
6.3.2023 15:00 CET 5 days Prague, Czech Republic English VILT G2R
12.6.2023 15:00 CET 5 days Prague, Czech Republic English VILT G2R

Who Should Attend

This course is targeted toward an IT Professional that has the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments. Students should have a minimum of 10 years experience including at least 5 years of hands-on technical security experience.

Prerequisite Courses Recommended

Course Objectives

Upon successful completion of this course, students will be able to:

  • identify enterprise security fundamentals.
  • apply enterprise security technology solutions.
  • implement security design and solutions.
  • manage risk, policies and procedures within an enterprise..
  • integrate security solutions within an enterprise.
  • conduct security research and analysis.

Agenda

  1. Enterprise Security Architecture
    • The Basics of Enterprise Security
    • The Enterprise Structure
    • Enterprise Security Requirements
  2. Enterprise Security Technology
    • Common Network Security Components and Technologies
    • Communications and Collaboration Security
    • Cryptographic Tools and Techniques
    • Advanced Authentication
  3. Enterprise Resource Technology
    • Enterprise Storage Security Issues
    • Distributed, Shared, and Virtualized Computing
    • Cloud Computing and Security
  4. Security Design and Solutions
    • Network Security Design
    • Conduct a Security Assessment
    • Host Security
  5. Application Security Design
    • Application Security Basics
    • Web Application Security
  6. Managing Risk, Security Policies, and Security Procedures
    • Analyze Security Risk
    • Implement Risk Mitigation Strategies and Controls
    • Implement Enterprise-Level Security Policies and Procedures
    • Prepare for Incident Response and Recovery
  7. Enterprise Security Integration
    • The Technology Life Cycle
    • Inter-Organizational Change
    • Integrate Enterprise Disciplines to Achieve Secure Solutions
  8. Security Research and Analysis
    • Perform an Industry Trends and Impact Analysis
    • Perform an Enterprise Security Analysis
We use cookies
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Cookie Policy.