Course Highlights
- There are many devices that part of a robust network infrastructure. This course focuses in the Installation, configuration and troubleshooting information security devices.
- After completing this first course, students will be able to:
- Effectively prioritize the response to a security incident
- Build a computer security incident response team (CSIRT)
- Develop an incident response action plan
- Post-incident activity
- Define the Azure security architecture like Azure Security Services, Azure Network Security, Azure Public Cloud Services, Azure Networking, Secure Remote Access and Cross Premises Connectivity
- Define the Azure Security and Operations management services like Shared Responsibility for Security, Azure Security Center, Azure Backup, Azure Log Analytics
- Define the Enterprise Mobility and Security services like Microsoft Intune, Windows Auto Pilot"
- Co-branded certificate by FutureSkills Prime & SkillUp
- Eligible for GOVT. OF INDIA Incentives
- Job Roles:
- Security Analyst
-
Skill Type
-
Course Duration
-
Domain
-
Course Category
-
Nasscom Assessment
-
Placement Assistance
-
Certificate Earned
-
Content Alignment Type
-
NOS Details
-
Mode of Delivery
Course Details
What will you learn in Information Security Devices (SKO 0903) course?
After completing this course, one will have sufficient know-how of:
- Building a security infrastructure under the NIST Framework
- Incident Response Policy, Plan, and Procedure Creation
- The security incident report
- Microsoft Security Services
Why you should take Information Security Devices (SKO 0903) course?
- This course is designed to help you manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of your incident response efforts.
- This course is designed to get you familiarized with Windows 10 security features.
Who should take Information Security Devices (SKO 0903) course?
This course is designed for those who want to manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of the incident response efforts.
Curriculum
Course 1
- Module 1
- Introduction
- What is threat modelling?
- Key Takeaways from Cyberattacks
- Cyber Threat modeling
- NIST Cybersecurity Framework
- Prepare for a security incident
- Phases of a major response
- Recovery preparations
- Critical success factors
- Module 2
- Incident Response Policy, Plan, and Procedure Creation
- Creation of a CSIRT
- List for developing a CSIRT
- Team duties
- Team preparations
- Establishing team roles
- CSIRT communications
- Recovering your systems
- Key Takeaways
- Module 3
- The security incident report
- Practice walking through a security incident report
- Next steps
Course 2
- Module 1 – Azure Security Architecture
- Azure security architecture overview
- Azure Networking Security
- Network Security Groups
- Secure Remote Access
- Monitoring and threat detection
- Azure Reference architectures
- Secure Azure Virtual Machine Templates
- Module 2 – Azure Security and Operations Management
- The cloud service models
- Shared responsibilities for security
- The features of Azure Security Center
- Azure Security Center case study
- Non-graded lab using Azure Security Center
- Azure Backup
- Azure Log Analytics
- Module 3 – Azure Security Services
- Azure Application Gateway
- Web Application Firewall adds to the security posture
- Distributed Denial of Services (DDoS) attacks in Azure
- Azure Disk & Storage Encryption
- Azure SQL Encryption
- Module 4 – Data Management for Apple, Android, Windows Device
- Microsoft Intune for Windows, iOS, and Android devices
- Device Health Attestation
- Mobile Device Management (MDM)
- Mobile Application Management (MAM)
- Data governance with GDPR
- Security aspects of AutoPilot
- Module 5 - Course Completion
- Graded Lab
- Final Exam
- Post Course Survey
!~mcd_text_data_6~!