Security Analyst to Security Architect- Track 3: Vulnerability Analyst

$329.00
$398.09 incl. vat

ADD_TO_CART_INFO_FOR_BUSINESS

duration: 11 hours |

Language: English (US) |

access duration: 365 days |

Details

This is the third track of the learning path Security Analyst to Security Architect, where the focus is on the role of Vulnerability Analyst. You will learn about vulnerability management, IDS / IPS, authentication, secure encryption, incident tracking, developing security topologies and security architectures. In the third track of this learning path you will find various training courses that prepare you to get started as a Vulnerability Analyst. In addition, a live lab is available that teaches you to apply the learned theory in a practical environment. You conclude this part with an exam.

Result

After completing this section, you will be familiar with security vulnerabilities. You are familiar with the STRIDE model, intrusion detection systems (IDS), intrusion prevention systems (IPS), but also with challenges for DevOps and Agile mindsets in terms of security decisions, and the network security problems for hybrid cloud models. In addition, you will have enough tools to get started as a Vulnerability Analyst.

Furthermore, you are ready for the fourth track of this learning path.

Prerequisites

You have successfully completed track 1 and track 2 of this learning path.

Target audience

Security Specialist

Content

Security Analyst to Security Architect- Track 3: Vulnerability Analyst

11 hours

Security Vulnerabilities: Managing Threats & Vulnerablilities

Security Vulnerabilities: Managing Threats & Vulnerablilities

Intrusion Detection Best Practices

Intrusion Detection Best Practices

Intrusion Prevention: Best Practices

Intrusion Prevention: Best Practices

Authentication & Encryption: Best Practices

Explore the authentication, authorization, and encryption options that a security architect will need on a day-to-day basis. The focus will be on two fronts - from a network security standpoint including cloud services and internal solutions an Agile and DevOps environment.

Security Topologies: Developing Secure Networks

Explore secure network challenges and security measures used to configure common tools. Familiarize yourself with approaches to configuration with a security mindset and review common security threats and their mitigations.

Security Architect: Secure Coding Concepts

Explore secure coding from the standpoint of a security architect, including best practices for both security design and architecture implementation, and the level of influence needed by the security architect to influence secure coding practices.

Security Architectures: Defensible Security

Explore defensible architecture and zero-trust models from the standpoint of a security architect. Familiarize yourself with challenges and tools used to address the challenges of network security. Review common security models and standards for network security.

Vulnerability Analyst

  • Practice Vulnerability Analyst tasks such as performing local network scans, configuring Snort IDS, configuring and implementing intrusion detection, as well as configuring remote access with Secure Shell. Then, test your skills by answering assessment questions after cleaning input data, managing incidents, and configuring secure HTTPS and VPN services.
  • This lab provides access to tools typically by Vulnerability Analysts, including:
  • � PowerShell 5.1
  • � Nmap 7.60
  • � OpenSSH 7.6p1
  • � Nginx 1.14.0
  • � Snort 2.9.7.0
  • � Suricata 3.2
  • � MySQL
  • � Python 3.6.9
  • � Python3-pip pip 9.0.1
  • � Docker 18.09.7
  • This lab is part of the Vulnerability Analyst track of the Skillsoft Aspire Security Analyst to Security Architect journey.

Final Exam: Vulnerability Analyst

  • Final Exam: Vulnerability Analyst will test your knowledge and

  • application of the topics presented throughout the Vulnerability
  • Analyst track of the Skillsoft Aspire Security Analyst to Security
  • Architect Journey. Learners seeking to test their knowledge and
  • application of Vulnerability Analyst skills and those seeking to
  • complete the Vulnerability Analyst track of the Skillsoft Aspire
  • Security Analyst to Security Architect Journey.

Course options

We offer several optional training products to enhance your learning experience. If you are planning to use our training course in preperation for an official exam then whe highly recommend using these optional training products to ensure an optimal learning experience. Sometimes there is only a practice exam or/and practice lab available.

Optional practice exam (trial exam)

To supplement this training course you may add a special practice exam. This practice exam comprises a number of trial exams which are very similar to the real exam, both in terms of form and content. This is the ultimate way to test whether you are ready for the exam. 

Optional practice lab

To supplement this training course you may add a special practice lab. You perform the tasks on real hardware and/or software applicable to your Lab. The labs are fully hosted in our cloud. The only thing you need to use our practice labs is a web browser. In the LiveLab environment you will find exercises which you can start immediatelyThe lab enviromentconsist of complete networks containing for example, clients, servers,etc. This is the ultimate way to gain extensive hands-on experience. 

WHY_ICTTRAININGEN

Via ons opleidingsconcept bespaar je tot 80% op trainingen

Start met leren wanneer je wilt. Je bepaalt zelf het gewenste tempo

Spar met medecursisten en profileer je als autoriteit in je vakgebied.

Ontvang na succesvolle afronding van je cursus het officiële certificaat van deelname van Icttrainingen.nl

Krijg inzicht in uitgebreide voortgangsinformatie van jezelf of je medewerkers

Kennis opdoen met interactieve e-learning en uitgebreide praktijkopdrachten door gecertificeerde docenten

Orderproces

Once we have processed your order and payment, we will give you access to your courses. If you still have any questions about our ordering process, please refer to the button below.

read more about the order process

What is included?

Certificate of participation Yes
Monitor Progress Yes
Award Winning E-learning Yes
Mobile ready Yes
Sharing knowledge Unlimited access to our IT professionals community
Study advice Our consultants are here for you to advice about your study career and options
Study materials Certified teachers with in depth knowledge about the subject.
Service World's best service

Platform

Na bestelling van je training krijg je toegang tot ons innovatieve leerplatform. Hier vind je al je gekochte (of gevolgde) trainingen, kan je eventueel cursisten aanmaken en krijg je toegang tot uitgebreide voortgangsinformatie.

Life Long Learning

Follow multiple courses? Read more about our Life Long Learning concept

read more

Contact us

Need training advise? Contact us!


contact