![]() Investigating Threat Data and Intelligence Sources.Managing Incident Response, Mitigation and Recovery.Managing Data Sources for Incident Response.Vulnerability management, assessment, and analysis.You will also take your first belt exam and receive the voucher to take the Security+ certification exam. Configuring an Intrusion Detection Systemīy completing this track, students will be able to demonstrate to prospective employers basic security skills required to install and configure systems to secure applications, networks, and devices perform threat analysis and respond with appropriate mitigation techniques participate in risk mitigation activities and operate with an awareness of applicable policies and regulations.Performing Network Reconnaissance and Vulnerability Scanning.Installing, Using, and Blocking a Malware-based Backdoor.Auditing Passwords with a Password Cracking Utility.Analyzing the Results of a Credentialed Vulnerability Scan. ![]() Intercepting and Interpreting Network Traffic with Packet Sniffing.Completing essential cybersecurity reading and assignments to familiarize yourself with the framework and foundations of cybersecurity.Review of the resources we use to stay "in the know" about cybersecurity related info.Will cover the schedule, stack expectations, certification process, and graduation.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |