top of page

Operational Cybersecurity 1B: Security & Planning in the Workplace

사이버 보안 전문가 
Career Pathway 과정 단위

Unit 1: Access Control in a Corporate Context
  • Explain the components that allow a user to be authorized on a network

  • Understand access control models and their uses

  • Recommend policies to protect against third-party vulnerabilities

  • Discuss the 2019 Capital One data breach

Unit 2: Authentication at Work
  • Explain authentication factors

  • Understand how biometrics are used as authentication factors

  • Identify protocols used in network-level authentication

  • Consider the use of single sign-on (SSO) and the implementation of authentication on switches and routers

  • Think about a perfect protocol scenario

Unit 3: Scenarios: Testing and Troubleshooting
  • Explain the need for continuous monitoring

  • Understand the basics of digital forensics

  • Describe the vulnerability scan process

  • Consider the penetration testing process

  • Plan possible post-scan actions

Unit 4: Response & Recovery Planning
  • Identify the difference between incident response and disaster recovery plans

  • Understand the NIST 800-61 incident response framework

  • Identify the steps in the Cyber Kill Chain®, MITRE ATT&CK, and Diamond model frameworks

  • Respond to a mock security incident

  • Conduct a post-incident analysis


Unit 5: Security Awareness & Training
  • Identify security awareness training frameworks

  • Explain various data classification categories

  • List examples of good workplace security habits

  • Consider positive security habits for Sys Admins

  • Understand hands-on learning opportunities in cybersecurity

Unit 6: Ethical Concerns in Cybersecurity
  • Identify different types of computer crimes and their consequences

  • Explain different types of copyright issues in the digital era

  • Understand how to handle data ethically

  • Consider data laws that are in place in the United States

  • Describe best practices concerning ethical behavior on networks and in personal digital activities

Unit 7: Personal Device Security
  • Define different device ownership models

  • Identify various security concerns related to employees bringing personal devices to work

  • Explain the purpose of mobile device management (MDM) platforms

  • List various MDM polices that can be enforced

  • Understand how Cisco Systems selected a new MDM

Unit 8: Gliders Expands
  • Define the cloud and discuss why an organization may use these types of platforms

  • Identify different cloud platform security controls

  • Consider cloud application security controls

  • Understand cloud security misconfigurations

유용한 링크

우리를 따르십시오!

  • BEST Academy Facebook Page
  • BEST Academy Instagram Page
  • BEST Academy Twitter Handle
  • BEST Academy YouTube Channel

연락하다

베스트 아카데미

1704 케이프 혼

줄리안, CA 92036

info@bestacademycs.com

833-619-베스트 (2378)

팩스: 619-359-8977

정보 요청

이 웹사이트를 모든 사용자가 액세스할 수 있도록 하는 것이 Brookfield Engineering Science Technology Academy의 목표입니다. 당신은 우리의 접근성 성명을 볼 수 있습니다여기.  제발연락하다접근성 문제에 대한 BEST 아카데미asoriano@bestacademycs.com

BEST Academy는 평등한 기회를 제공하는 고용주/프로그램이며 적극적인 비차별 프로그램에 전념하고 있습니다. BEST Academy는 실제 또는 인지된 혈통, 연령, 피부색, 성별 표현, 국적, 인종 또는 민족, 성별, 성적 취향, 또는 이러한 실제 중 하나 이상을 가진 개인 또는 그룹과의 연관성에 근거한 차별, 괴롭힘, 위협 및 따돌림을 금지합니다. 또는 인지된 특성. 

© 2022 브룩필드 엔지니어링 과학 기술 아카데미. 판권 소유.

에서 디자인한 웹사이트조형교육

bottom of page