Course Provider
What will you learn in Information Security Devices (SKO 0903) course?
After completing this course, one will have sufficient know-how of:
- Building a security infrastructure under the NIST Framework
- Incident Response Policy, Plan, and Procedure Creation
- The security incident report
- Microsoft Security Services
Information Security Devices (SKO 0903)
-
Skill Type
Emerging Tech
- Domain
cyber security
- Course Category
Deepskilling Course
- Certificate Earned Joint Co-Branded Participation Certificate
- Nasscom assessment Available
- Course Covered under GoI Incentive
Yes
-
- Course Price
INR 2,999+ 18% GST
- Course Duration
5 Hours
- Course Price
Why you should take Information Security Devices (SKO 0903) course?
- This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.
- This course is designed to get you familiarized with Windows 10 security features.
Who should take Information Security Devices (SKO 0903) course?
This course is designed for those who want to manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of the incident response efforts.
Curriculum
Course 1
- Module 1
- Introduction
- What is threat modelling?
- Key Takeaways from Cyberattacks
- Cyber Threat modeling
- NIST Cybersecurity Framework
- Prepare for a security incident
- Phases of a major response
- Recovery preparations
- Critical success factors
- Module 2
- Incident Response Policy, Plan, and Procedure Creation
- Creation of a CSIRT
- List for developing a CSIRT
- Team duties
- Team preparations
- Establishing team roles
- CSIRT communications
- Recovering your systems
- Key Takeaways
- Module 3
- The security incident report
- Practice walking through a security incident report
- Next steps
Course 2
- Module 1 – Azure Security Architecture
- Azure security architecture overview
- Azure Networking Security
- Network Security Groups
- Secure Remote Access
- Monitoring and threat detection
- Azure Reference architectures
- Secure Azure Virtual Machine Templates
- Module 2 – Azure Security and Operations Management
- The cloud service models
- Shared responsibilities for security
- The features of Azure Security Center
- Azure Security Center case study
- Non-graded lab using Azure Security Center
- Azure Backup
- Azure Log Analytics
- Module 3 – Azure Security Services
- Azure Application Gateway
- Web Application Firewall adds to the security posture
- Distributed Denial of Services (DDoS) attacks in Azure
- Azure Disk & Storage Encryption
- Azure SQL Encryption
- Module 4 – Data Management for Apple, Android, Windows Device
- Microsoft Intune for Windows, iOS, and Android devices
- Device Health Attestation
- Mobile Device Management (MDM)
- Mobile Application Management (MAM)
- Data governance with GDPR
- Security aspects of AutoPilot
- Module 5 - Course Completion
- Graded Lab
- Final Exam
- Post Course Survey
FAQs
A security incident response is a planned and organized response to a security breach or cyber-attack. The objective of a security incident response is to limit the damage that has been caused, or may be caused, as a result of such a breach. It must also seek to reduce the time it takes to recover from the incident and limit the costs as much as possible.
Once you have completed this course, you will be able to:
- Effectively prioritize the response to a security incident.
- Build a computer security incident response team (CSIRT).
- Develop an incident response action plan.
- List appropriate post-incident activities
This course is run by our partner SkillUp Online. It is 100% online, and you do not need to attend any classes in person. You simply require adequate access to the internet and the required technology to be able to use the course materials, which come in the form of articles, videos, and knowledge checks. Plus, you will be able to connect easily with others on the course and your mentors through the discussion space.
As soon as you enroll for this course, you will have access to all the information and materials in your dashboard.
You need to be familiar with:
- The current cybersecurity ecosystem.
- Analysis of hacks on computers and networks.
- Basic risk management.