Security Analyst
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
This course explains the analysis of data security we learn shields computer networks from cyber-attacks and creates cybersecurity policies and practices for the entire organization
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Learn deep knowledge of organization’s IT Systems.
- Learn IT Security threat analysis and management.
- Learn IT Security maintenance, training, and support
- Learn IT security fixes, tools, countermeasures, testing plus upgrade paths
-
COURSE AUDIENCE
This course is made for:
- Network server administrators
- Firewall administrators
- Information security analysts
- System administrators
- Risk assessment professionals
- Anyone who wants to expand their knowledge on information security
- Those interested in a career as an information security analyst
- Anyone looking to land a job as a Security Analyst
-
COURSE OUTLINE
Day One:
- Need for Security Analysis
- TCP IP Packet Analysis
- Penetration Testing Methodologies
- Customers and legal Agreements
Day Two:
- Rules of Engagement
- Penetration Testing Planning and Scheduling
- Pre- Penetration Testing Steps
- Information gathering
Day Three:
- Vulnerability Analysis
- External penetration Testing
- Internal Network Pen Testing
Day Four:
- Firewall Penetration Testing
- IDS Penetration Testing
- Password Cracking Penetration Testing
Day Five:
- Social Engineering Penetration Testing
- Web Application Penetration Testing
- SQL Penetration Testing
- Penetration Testing Reports and Post Testing Actions
Keyword
Training Subject
Training Location