Cyber Security Technology Specialist
The course provides knowledge in most common Cyber Security technologies and tools for proficient working knowledge within the following risk domains/technologies: database and application security;
IDS/IPS technologies; system/access administration; firewall technologies
Network Architecture; security event logging & monitoring; key management/tokenization; database/application/network layer secure; protocols; physical and environmental security; secure software/code development; change management; vulnerability management.
Cyber Security Technology specialists are widely demanded both in private and governmental sectors. With the constant growth of data consumption and specially BIG DATA, technology of the Cyber Defense became a corner-stone of the successful implementation of the Cyber Police and routine. Future Cyber technology will require broad range of skills and knowledge, to be acquired and trained by top-level specialists to address industry standards. Emerging technologies of Cloud data and IoT represent only a tip of the iceberg of the complexity and inter-vulnerability of the systems and the impact of the potential threats. Within the IDmap Institute learning environment Cyber Security Technology Specialists acquire best practices and knowledge and prepare for the future industry changes.
Credit towards: Cyber Education Certificate Program
Audience of the course:
Cyber penetration testers and Cyber managers are recommended to take this course to obtain in-depth practical knowledge on recent industry trends. The course requires beginners level of technical knowledge equal to the Cyber Security Practitioner graduate of IDmap Institute. Applicant with few years of experience in Cyber defense is advanced to take a pretest to evaluate the level of the initial knowledge and fill the gaps if required.
This course is a self-paced guided course with online training and practical assignments. Learners are required to follow preset learning schedule. In case of requested pause in between the lessons, learners will notify IDmap Institute in advance of 2 days to allow successful pause of the class.
|TCP/IP for CSTS||00:45:00|
|Cyber risks identification for CSTS||00:45:00|
|Kill chain for CSTS||00:45:00|
|Anomaly Detection for CSTS||00:45:00|
|APT (Advanced Persistent Threat) for CSTS||00:00:00|
|Authorization for CSTS||00:00:00|
|Detection alerts and indicators of fraud for CSTS||00:00:00|
|Identity management software for CSTS||00:00:00|