CYBERSECURITY ANALYST
CompTIA® Cybersecurity
This 5-day course covers the duties of cybersecurity analysts who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents.
By the end of this course, you’ll gain skills in:
|
Microsoft Information Protection Administrator
Learn how to protect information in your Microsoft 365 deployment during this all incompassing 2-day course. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics.
By the end of this course, you’ll gain skills in:
|
Implementing an Integrated Threat Defense Solution v1.2
The Implementing an Integrated Threat Defense Solution (SECUR201) v1.2 course provides an analysis of the cybersecurity landscape with an emphasis on the importance of an integrated threat defense architecture. This course will be taught through a combination of lessons and hands-on practice, you will learn to deploy and integrate Cisco®’s Integrated Threat Defense solutions which includeCisco Identity Services Engine (ISE), Cisco Stealthwatch, Cisco Firepower NGFW, and Cisco AMP for Endpoints.
By the end of this course, you’ll gain skills in:
|
Integrated Threat Defense Investigation and Mitigation v1.0
The Cisco Integrated Threat Defense Investigation and Mitigation (SECUR202) v1.0 course demonstrates the best practices in identifying, isolating, and mitigating network threats using the Cisco Integrated Threat Defense solution platform.
By the end of this course, you’ll gain skills in:
|
CCTIA: Certified Cyber Threat Intelligence Analyst
Threat Intelligence enables Businesses to provide the best possible defense against the most probable threats. This course introduces attendees with the basics concepts of Threat Intelligence and take them thru the entire process of setting up a Threat Intel Platform using MISP to consume all the intelligence from around 80+ global community feeds and also enables the attendees to share intelligence on malwares and attacks back to the community.
By the end of this course, you’ll gain skills in:
© 2021 TRAINOCATE MALAYSIA SDN BHD. ALL RIGHTS RESERVED