Ansys|91国内精品视频|Matlab|91国内精品久久久|R语言培训课程班-91国内精品久久-曙海培训深圳成都南京苏州杭州

曙海教育集團(tuán)
全國(guó)報(bào)名免費(fèi)熱線:4008699035 微信:shuhaipeixun
或15921673576(微信同號(hào)) QQ:1299983702
首頁(yè) 課程表 在線聊 報(bào)名 講師 品牌 QQ聊 活動(dòng) 就業(yè)
 
Cybersecurity Fundamentals培訓(xùn)

 
   班級(jí)規(guī)模及環(huán)境--熱線:4008699035 手機(jī):15921673576( 微信同號(hào))
       每期人數(shù)限3到5人。
   上課時(shí)間和地點(diǎn)
開課地址:【上海】同濟(jì)大學(xué)(滬西)/新城金郡商務(wù)樓(11號(hào)線白銀路站)【深圳分部】:電影大廈(地鐵一號(hào)線大劇院站) 【武漢分部】:佳源大廈【成都分部】:領(lǐng)館區(qū)1號(hào)【沈陽(yáng)分部】:沈陽(yáng)理工大學(xué)【鄭州分部】:錦華大廈【石家莊分部】:瑞景大廈【北京分部】:北京中山學(xué)院 【南京分部】:金港大廈
最新開班 (連續(xù)班 、周末班、晚班):2020年3月16日
   實(shí)驗(yàn)設(shè)備
     ☆資深工程師授課
        
        ☆注重質(zhì)量 ☆邊講邊練

        ☆合格學(xué)員免費(fèi)推薦工作
        ★實(shí)驗(yàn)設(shè)備請(qǐng)點(diǎn)擊這兒查看★
   質(zhì)量保障

        1、培訓(xùn)過程中,如有部分內(nèi)容理解不透或消化不好,可免費(fèi)在以后培訓(xùn)班中重聽;
        2、培訓(xùn)結(jié)束后,授課老師留給學(xué)員聯(lián)系方式,保障培訓(xùn)效果,免費(fèi)提供課后技術(shù)支持。
        3、培訓(xùn)合格學(xué)員可享受免費(fèi)推薦就業(yè)機(jī)會(huì)。

課程大綱
 

DOMAIN 1: CYBERSECURITY CONCEPTS
1.1 Knowledge of information assurance (IA) principles used to manage risks related to the use, processing, storage and transmission of information or data.
1.2 Knowledge of security management.
1.3 Knowledge of risk management processes, including steps and methods for assessing risk.
1.4 Knowledge of the organization’s enterprise information technology (IT) goals and objectives.
1.5 Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation state sponsored] and third generation [nation state sponsored]).
1.6 Knowledge of information assurance (IA) principles and organizational requirements that are relevant to confidentiality, integrity, availability, authentication and non-repudiation.
1.7 Knowledge of common adversary tactics, techniques, and procedures (TTPs) in assigned area of responsibility (e.g., historical country-specific TTPs, emerging capabilities).
1.8 Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).
1.9 Knowledge of relevant laws, policies, procedures and governance requirements.
1.10 Knowledge of relevant laws, policies, procedures or governance as they relate to work that may impact critical infrastructure.
DOMAIN 2: CYBERSECURITY ARCHITECTURE PRINCIPLES
2.1 Knowledge of network design processes, to include understanding of security objectives, operational objectives and tradeoffs.
2.2 Knowledge of security system design methods, tools and techniques.
2.3 Knowledge of network access, identity and access management (e.g., public key infrastructure [PKI]).
2.4 Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
2.5 Knowledge of current industry methods for evaluating, implementing and disseminating information technology (IT) security assessment, monitoring, detection and remediation tools and procedures, utilizing standards-based concepts and capabilities.
2.6 Knowledge of network security architecture concepts, including topology, protocols, components and principles (e.g., application of defence in depth).
2.7 Knowledge of malware analysis concepts and methodology.
2.8 Knowledge of intrusion detection methodologies and techniques for detecting host-and network- based intrusions via intrusion detection technologies.
2.9 Knowledge of defence in depth principles and network security architecture.
2.10 Knowledge of encryption algorithms (e.g., internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE]).
2.11 Knowledge of cryptology.
2.12 Knowledge of encryption methodologies.
2.13 Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [ITCP/IP], Open System Interconnection model [OSI]).
2.14 Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol
DOMAIN 3: SECURITY OF NETWORK, SYSTEM, APPLICATION AND DATA
3.1 Knowledge of computer network defence (CND) and vulnerability assessment tools, including open source tools, and their capabilities.
3.2 Knowledge of basic system administration, network and operating system hardening techniques.
3.3 Knowledge of risk associated with virtualizations.
3.4 Knowledge of penetration testing principles, tools and techniques (e.g., metasploit, neosploit).
3.5 Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring) and tools.
3.6 Knowledge of remote access technology concepts.
3.7 Knowledge of systems administration concepts.
3.8 Knowledge of Unix command line.
3.9 Knowledge of system and application security threats and vulnerabilities.
3.10 Knowledge of system lifecycle management principles, including software security and usability.
3.11 Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance and reliability.
3.12 Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
3.13 Knowledge of social dynamics of computer attackers in a global context.
3.14 Knowledge of secure configuration management techniques.
3.15 Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media and related hardware.
3.16 Knowledge of communication methods, principles and concepts that support the network infrastructure.
3.17 Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications.
3.18 Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Local Area Network [WLAN], Wireless Wide Area Network [WWAN]).
3.19 Knowledge of virtualization technologies and virtual machine development and maintenance.
3.20 Knowledge of application vulnerabilities.
3.21 Knowledge of information assurance (IA) principles and methods that apply to software development.
3.22 Knowledge of risk threat assessment.
DOMAIN 4: INCIDENT RESPONSE
4.1 Knowledge of incident categories, incident responses and timelines for responses.
4.2 Knowledge of disaster recovery and continuity of operations plans.
4.3 Knowledge of data backup, types of backups (e.g., full, incremental) and recovery concepts and tools.
4.4 Knowledge of incident response and handling methodologies.
4.5 Knowledge of security event correlation tools.
4.6 Knowledge of investigative implications of hardware, operating systems and network technologies.
4.7 Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody).
4.8 Knowledge of types of digital forensics data and how to recognize them.
4.9 Knowledge of basic concepts and practices of processing digital forensic data.
4.10 Knowledge of anti-forensics tactics, techniques, and procedures (TTPS).
4.11 Knowledge of common forensic tool configuration and support applications (e.g., VMWare, Wireshark).
4.12 Knowledge of network traffic analysis methods.
4.13 Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.
DOMAIN 5: SECURITY OF EVOLVING TECHNOLOGY
5.1 Knowledge of new and emerging information technology (IT) and information security technologies.
5.2 Knowledge of emerging security issues, risks, and vulnerabilities.
5.3 Knowledge of risk associated with mobile computing.
5.4 Knowledge of cloud concepts around data and collaboration.
5.5 Knowledge of risk of moving applications and infrastructure to the cloud.
5.6 Knowledge of risk associated with outsourcing
5.7 Knowledge of supply chain risk management processes and practices

 
  備案號(hào):備案號(hào):滬ICP備08026168號(hào)-1 .(2024年07月24日)....................
主站蜘蛛池模板: 全球环保研究网_生态环境绿色产业咨询部_生态文明建设行业智库 ? | 烟台废旧物资回收,烟台废品回收,烟台物资回收-烟台金泰再生资源有限公司 | 全国产品维权打假真伪验证系统-石家庄市海略科技有限公司官方网站 | 西安logo设计公司/西安包装设计公司/西安画册设计公司/西安广告公司/西安品牌设计公司/泰勒广告 雾度计-雾度仪-透光率测试仪-3nh品牌雾度仪生产厂家 | 苏州探测器清洗_烟感探头清洗_感烟探测器维修清洗_火灾探测器清洗报价/价格_进口国产消防设备清洗_江苏智淼探测器清洗厂家- | 深圳店铺装修-连锁店装修-深圳标榜装饰设计 | 双单面研磨机_陶瓷平面研磨机_机械密封件研磨机-百诚研磨机械 | 辣椒烘干机-百信机械提供大中小型辣椒烘干机房设备视频图片厂家价格多少钱 | 起名字典|宝宝新生儿男孩女孩起名免费网-诗经周易生辰八字取名字大全 | 混凝土修补-清水混凝土保护剂-仿清水混凝土-混凝土装修-混凝土色差处理-混凝土色差修复剂-德州唐荣建筑装饰工程有限公司 | 压力容器锻件_升高法兰_管板_阀体_接管锻件 - 山西中重重工集团 压力机-压装机-黄油机-黄油泵-[广东品嘉灵]专业定制各种精密压装设备 | 聚达|聚达物联|聚达物联科技|杭州聚达物联科技有限公司|www.judawulian.com|智慧社区|数字驾驶舱|智慧清运|智慧工地|邻家小达 | 增压泵-离心泵-管道泵-排污泵-上海渤泉泵业制造有限公司 【官方网站】 | 金煌家装官网-长沙装饰|长沙装修|长沙装修公司|长沙装饰公司-金煌家装 | 呼吸家官网|肺功能检测仪生产厂家|国产肺功能仪知名品牌|肺功能检测仪|肺功能测试仪|婴幼儿肺功能仪|弥散残气肺功能仪|肺功能测试系统|广州红象医疗科技有限公司|便携式肺功能仪|大肺功能仪|呼吸康复一体机|儿童肺功能仪|肺活量计|医用简易肺功能仪|呼吸康复系统|肺功能仪|弥散肺功能仪(大肺)|便携式肺功能检测仪|肺康复|呼吸肌力测定肺功能仪|肺功能测定仪|呼吸神经肌肉刺激仪|便携式肺功能 | 文轩热能_水冷板散热器热设计热管理系统_铝型材铲齿摩擦焊热管_散热片散热板生产加工厂家 | 领先的木工机械生产厂家,原木加工流水线,立式带锯机,数控木工跑车-邢台亚士达机械制造有限公司 | 注册公司计|代理记账|临港招商_上海临港商盟官网| 气相色谱仪生产厂家批发价格找上海惠分科学分析仪器有限公司 | 纸箱抗压测定仪|电脑测控耐破度仪|电脑抗张试验仪|杭州华翰仪器百科 | 青岛网站建设_网站制作_品牌设计_网站设计_圭谷设计 | 七评-爱美儿信息科技有限公司〖官网〗? | 深圳市佳顺优印印刷有限公司,佳顺优印,画册印刷,海报印刷,封套印刷,手提袋印刷,包装盒印刷,彩盒印刷,无碳纸印刷,不干胶印刷,信封印刷,便笺印刷,笔记本印刷,台历印刷,挂历印刷,国际会展中心附近印刷厂,宝安印刷厂,宝安教材印刷厂 | 湖南净声源环保科技有限公司是一家专业从事噪声治理和建筑声学设计生态环境综合治理服务的企业,专业从事株洲电梯隔音治理,湘潭中央空调降噪处理,衡阳邵阳冷却塔噪音治理,岳阳常德大型风机噪声隔音降噪,张家界空压机噪声治理,益阳配电房变压器噪声治理,专业郴州永州工厂企业车间噪声治理,怀化娄底专业机械设备减振降治理,武汉噪音治理隔音降噪公司,孝感噪音治理,立式球磨机的噪声控制,专业隔音降噪公司,、以及各类机械动力设备减振降噪噪声治理的公司,同时为客户提供咨询与解决方案 | 正拓夏令营官网-中小学生军事夏令营-研学军旅训练拓展夏令营 | 河北永生食品有限公司,益宁挂面, 香海园| 上海况胜_玻璃反应釜厂家_双层玻璃反应釜_实验室玻璃反应釜 | 智能调光模块,调光系统巨川电气-专注智能照明 | 尼龙柱鞋-弹性防爆胶圈-氟胶油封-彩色氟胶o型圈 - 巨鹿县长城矿山机械配件有限公司 | 环球医网 | 带来健康生活...| 永磁变频空压机_青岛空压机_螺杆空压机_口罩专用空压机-青岛凯瑞特机电设备有限公司 | 全自动冷冻研磨仪-高通量组织研磨仪厂家-「杭州宋慈智能科技」 | 微机保护装置_发电机保护_变压器保护_逆功率保护_防孤岛保护装置_光伏发电_杭州继保电气集团有限公司 | 宁波科迈尔工程机械有限公司-履带,底盘 | 炸鸡汉堡设备厂家-开汉堡炸鸡店需要的设备全套-广州英迪尔电器有限公司 | 摩托车-摩托车配件-摩托车与配件_摩托车与配件行业权威的门户网站! | 软文营销推广-新闻稿发布-软文撰写-百科词条编辑-品牌全案策划推广网络营销传播-喜尚传媒 | 水热反应釜厂家_水热反应釜价格_水热合成反应釜批发-仪贝尔仪器 - 水热釜,水热反应釜,水热反应釜厂家,水热反应釜价格,水热反应釜型号,水热反应釜内衬,水热反应釜25ml,水热反应釜50ml,水热反应釜100ml,水热合成反应釜 | 眉山净源居环保科技有限公司,眉山除甲醛公司,眉山甲醛治理,眉山保洁服务,眉山家政保洁,眉山家电维修 - 眉山净源居环保科技有限公司,眉山除甲醛公司,眉山甲醛治理,眉山保洁服务,眉山家政保洁,眉山家电维修 | 泰州光明会计师事务所有限公司-财务业务审计,会计服务业务及资产评估业务的专业服务机构 | 上海祝融起重机械有限公司-德国耶鲁手拉葫芦|耶鲁手拉葫芦|耶鲁手扳葫芦|耶鲁电动葫芦经销代理 | Cybersecurity Fundamentals培訓(xùn)學(xué)校