Seminarinhalt
Programm
- Internet / Deep Web / Dark Web
- Threat Actors / Nation-State Threats & TTPs
- Important Developments
Inventory of Authorized and Unauthorized Devices
- Inventory of Authorized and Unauthorized Software
- Continuous Vulnerability Assessment and Remediation
- Controlled Use of Administrative Privileges
- Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
- Maintenance, Monitoring, and Analysis of Audit Logs
- Email and Web Browser Protection
- Malware Defenses
- Limitation and Control of Network Ports, Protocols, and Services
- Data Recovery Capability
- Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
- Boundary Defense
- Data Protection
- Controlled Access Based on Need to Know
- Wireless Device Control
- Account Monitoring and Control
- Security Skills Assessment and Appropriate Training to Fill the Gaps
- Application Software Security
- Incident Response and Management
- Penetration Tests and Red Team Exercises
War-Stories
Ransomware-safe Backup Management
Security Operation Center Essentials
Zielgruppen
- IT-(Sicherheits-)Verantwortliche
- Informationssicherheisbeauftrage
- IT-Kräfte
- Interessierte.
Vorkenntnisse
- Betriebssysteme (Windows/Unix)
- Netzwerkgrundlagen (TCP/IP)
Fantastisch! Absolute Oppenheimer-Momente am laufenden Band! Vielen Dank dafür :-)
Technical Cybersecurity Training
05.09.2024Fantastisch! Absolute Oppenheimer-Momente am laufenden Band! Vielen Dank dafür :-)
— Stefan H.Äußerst kompetenter Trainer. Viel Wissen in kurzer Zeit.
Technical Cybersecurity Training
29.04.2024Äußerst kompetenter Trainer. Viel Wissen in kurzer Zeit.
— Rainer B.Toller Trainer - Inhalte werden sehr gut erklärt.
Technical Cybersecurity Training
12.06.2023Toller Trainer - Inhalte werden sehr gut erklärt.
— Daniel B.