top of page

Operational Cybersecurity 1B: Security & Planning in the Workplace

Especialista en ciberseguridad 
Unidades del curso de orientación profesional

Unit 1: Access Control in a Corporate Context
  • Explain the components that allow a user to be authorized on a network

  • Understand access control models and their uses

  • Recommend policies to protect against third-party vulnerabilities

  • Discuss the 2019 Capital One data breach

Unit 2: Authentication at Work
  • Explain authentication factors

  • Understand how biometrics are used as authentication factors

  • Identify protocols used in network-level authentication

  • Consider the use of single sign-on (SSO) and the implementation of authentication on switches and routers

  • Think about a perfect protocol scenario

Unit 3: Scenarios: Testing and Troubleshooting
  • Explain the need for continuous monitoring

  • Understand the basics of digital forensics

  • Describe the vulnerability scan process

  • Consider the penetration testing process

  • Plan possible post-scan actions

Unit 4: Response & Recovery Planning
  • Identify the difference between incident response and disaster recovery plans

  • Understand the NIST 800-61 incident response framework

  • Identify the steps in the Cyber Kill Chain®, MITRE ATT&CK, and Diamond model frameworks

  • Respond to a mock security incident

  • Conduct a post-incident analysis


Unit 5: Security Awareness & Training
  • Identify security awareness training frameworks

  • Explain various data classification categories

  • List examples of good workplace security habits

  • Consider positive security habits for Sys Admins

  • Understand hands-on learning opportunities in cybersecurity

Unit 6: Ethical Concerns in Cybersecurity
  • Identify different types of computer crimes and their consequences

  • Explain different types of copyright issues in the digital era

  • Understand how to handle data ethically

  • Consider data laws that are in place in the United States

  • Describe best practices concerning ethical behavior on networks and in personal digital activities

Unit 7: Personal Device Security
  • Define different device ownership models

  • Identify various security concerns related to employees bringing personal devices to work

  • Explain the purpose of mobile device management (MDM) platforms

  • List various MDM polices that can be enforced

  • Understand how Cisco Systems selected a new MDM

Unit 8: Gliders Expands
  • Define the cloud and discuss why an organization may use these types of platforms

  • Identify different cloud platform security controls

  • Consider cloud application security controls

  • Understand cloud security misconfigurations

Enlaces Útiles

¡Síganos!

  • BEST Academy Facebook Page
  • BEST Academy Instagram Page
  • BEST Academy Twitter Handle
  • BEST Academy YouTube Channel

Contacto

MEJOR Academia

1704 Cabo de Hornos

Julián, CA 92036

info@bestacademycs.com

833-619-MEJOR (2378)

FAX: 619-359-8977

Solicitar información

El objetivo de Brookfield Engineering Science Technology Academy es que todos los usuarios puedan acceder a este sitio web. Puede ver nuestra declaración de accesibilidadaquí.  Por favorcontactoBEST Academy para cualquier problema de accesibilidad enasoriano@bestacademycs.com

BEST Academy es un programa/empleador que ofrece igualdad de oportunidades y está comprometida con un programa activo de no discriminación. BEST Academy prohíbe la discriminación, el acoso, la intimidación y el hostigamiento en función de la ascendencia, la edad, el color, la expresión de género, la nacionalidad, la raza o el origen étnico, el sexo, la orientación sexual o la asociación con una persona o grupo con una o más de estas características reales o percibidas. o características percibidas. 

© 2022 Academia de Tecnología de Ciencias de Ingeniería de Brookfield. Reservados todos los derechos.

Sitio web diseñado porFormativEd

bottom of page