Course Report
Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.
Visit Course Report
Course Features
Duration
4 months
Delivery Method
Online
Available on
Limited Access
Accessibility
Desktop, Laptop
Language
English
Subtitles
English
Level
Intermediate
Effort
10 hours per week
Teaching Type
Self Paced
Course Description
Course Overview
Job Assistance
Personlized Teaching
International Faculty
Post Course Interactions
Hands-On Training
Case Studies, Captstone Projects
Skills You Will Gain
Prerequisites/Requirements
Be able to use Python as scripting language and SQL in order to run queries from Log data
Be familiar with security fundamentals including core security principles, critical security controls and best practices for securing information
Be knowledgeable in database design, large database systems, networking and operating systems
Have a basic understanding of client-server architecture
Have experience using Unix or Linux command line
Have familiarity with reading and creating simple network architecture diagrams
What You Will Learn
About the OWASP Top 10 and that they pose a critical threat to organizations
All of the ways to mitigate threats, including the OWASP Top 10
Analyze automated alerts for false positives and determine if they represent a real security threat
Apply security concepts to create defensible, resilient network architecture
Core principles and philosophy that drive work in the security field
Exploring the current threat landscape and identifying both threats and threat actors that organizations face
How to measure the risks associated with discovered vulnerabilities
Learn about vulnerabilities, their characteristics and their dynamic lifecycle
Learn what threat modeling is and build your own threat models
Physical, logical and administrative controls, their industry recognized frameworks, and how to apply them to secure a network, system or application
Target Students
Cyber security Analysts
Developers who already use SQL and Python and have a basic understanding of network infrastructure
Security Analysts
Security Engineers
Course Instructors