This Hands-On 5 day course provides an in-depth perspective on the challenges of designing a CyberSecurity programs, implementing secure systems, and other factors needed for a comprehensive CyberSecurity solution.
CyberSecurity is one of the biggest issues for todays Federal and DOD Agencies and commercial organizations. Developed and developing nations, governments, defense departments and industries, and organizations in critical infrastructure verticals are being increasingly targeted by never-ending surges of cyber attacks from criminals and nation-states seeking information, economic or military advantage. The rapidity of the attacks is now so large and their level of sophistication so great, that many organizations are finding it difficult to identify which threats and vulnerabilities pose the greatest risk. They are faced with decisions on how resources should be allocated to ensure that the most likely and potentially damaging attacks are dealt with first. Exacerbating the problem is that most organizations do not have complete understanding of CyberSecurity or an organizational approach to dealing with these challenges.
This course will help you better understand securing networks. You will be prepared to answer fairly technical security questions about Microsoft Active Directory, Unix, Linux, databases, firewall, intrusion detection systems and major network services like the Domain Name Services.
This course will concentrate on today's cyber security tools, operating systems, applications, network architectures and best practices in government and industry network security, with the focus not only on tool deployment and operation system configuration, but CyberSecurity network defense and analysis techniques.
Students will configure multiple operating systems, practice network defense techniques, and understand attack prevention methods in a state of the art security lab. This Instructor-led structured Hands-On experience, will take you through practical, simplified ways of securing these operating systems, applications and infrastructures in Today's Environment.
Anyone interested in, working with and or responsible for ways of securing operating systems, applications and infrastructures in Today's Environment.
Non.
A basic understanding of technical security controls or some previous experience with system administration will be beneficial.
Instructor-Led with numerous Hands-On labs and exercises.
BTS always provides equipment to have a very successful Hands-On course. BTS also encourages all attendees to bring their own equipment to the course. This will provide attendees the opportunity to incorporate their own gear into the labs and gain valuable training using their specific equipment.