There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.
After completing this course, participants will be able to work with:
Attacks, Threats and Vulnerabilities
• Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.
Architecture and Design
• Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.
• Expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.
Operations and Incident Response
• Covering organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.
Governance, Risk and Compliance
• Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.
Click on the following link to see the Current Course Schedule
Our minimum class-size is 3 for this course.
If there are no scheduled dates for this course, it can be customized to suit the time and skill needs of clients and it can be held online, at a rented location or at your premises.
Click on the following link below to arrange for a custom course: Enquire about a course date
Ethical hackers use their knowledge to secure and improve the technology of organizations. They provide an essential service to these organizations by looking for vulnerabilities that can lead to a security breach. An ethical hacker reports the identified vulnerabilities to the organization. Businesses and organizations hire ethical hackers to help improve their networks, applications, and other computer systems in order to prevent data theft and fraud. An ethical hacker will attempt to bypass system security, and find and expose any weak points that could be taken advantage of by a malicious hacker. Vulnerabilities are typically found in improper system configuration and in hardware or software flaws. One of the first examples of ethical hacking occurred in the 1970s when the US government used ‘red teams’ to hack its own computer systems.
Ethical hacking is a proactive form of information security. An ethical hacker uses the same techniques to bypass a system’s defenses as a malicious hacker, but rather than take advantage of any vulnerabilities they find, they provide advice on how to fix the vulnerabilities so a company can improve its overall security.
Additional Information and FAQs
CERTFICATE OF COMPLETION: Participants will receive a certificate of completion at the end of a course. This is not an official certification for the product and/or software. Our courses do indicate the appropriate certification exam(s) that the participant can sit. Data Vision Systems does not provide certification or deliver the certification exams. Participants are responsible for arranging and paying for the certification exams on the appropriate certification body.
CANCELLATION POLICY: There is never a fee for cancelling seven business days before a class for any reason. Data Vision Systems reserves the right to cancel any course due to insufficient registration or other extenuating circumstances. Participants will be advised prior to doing so.