Security Management
Rated 3.5/5 based on 11 customer reviews

Security Management

Available: In Stock
$250.00

Image

Course Overview

Assessing Information Security Risk

The Importance of Risk Management, Integrating Documentation into Risk Management (Part 1), Integrating Documentation into Risk Management (Part 2)

Responding to Cybersecurity Incidents

Deploy an Incident Handling and Response Architecture (Part 1), Deploy an Incident Handling and Response Architecture (Part 2), Deploy an Incident Handling and Response Architecture (Part 3), Contain and Mitigate Incidents (Part 1), Contain and Mitigate Incidents (Part 2),Prepare for Forensic Investigation as a CSIRT

Investigating Cybersecurity Incidents

Apply a Forensic Investigation (Part 1), Apply a Forensic Investigation (Part 2), Securely Collect and Analyze Electronic Evidence, Follow Up on the Results of an Investigation, Complying With State, Federal and National Legislation

Objectives

Real-world training is critical to cybersecurity success. With DiTech Solutions Battle Paths, you ll have access to training resources designed to develop skills demanded in the workplace.
Access a cloud-based cyber range, with real IT infrastructure, real security tools, and real threats. Work through hands-on training exercises and challenges as you upskill on a variety of cybersecurity concepts. Once you ve finished your journey, you ll earn a DiTech Solutions Badge to share your achievements with your network.
Whether you re just getting started in cybersecurity or are looking to build new skills,DiTech Solutions can take your career to the next level.

 

Platform Features

  • Train in virtual environments to see tools and concepts in action
  • Develop skills with hands-on modules built by cybersecurity experts>
  • Test and validate your capabilities against real threats
  • Set goals, track progress, and train on-demand,at your own pace

Course Overview

Assessing Information Security Risk

The Importance of Risk Management, Integrating Documentation into Risk Management (Part 1), Integrating Documentation into Risk Management (Part 2)

Responding to Cybersecurity Incidents

Deploy an Incident Handling and Response Architecture (Part 1), Deploy an Incident Handling and Response Architecture (Part 2), Deploy an Incident Handling and Response Architecture (Part 3), Contain and Mitigate Incidents (Part 1), Contain and Mitigate Incidents (Part 2),Prepare for Forensic Investigation as a CSIRT

Investigating Cybersecurity Incidents

Apply a Forensic Investigation (Part 1), Apply a Forensic Investigation (Part 2), Securely Collect and Analyze Electronic Evidence, Follow Up on the Results of an Investigation, Complying With State, Federal and National Legislation

Objectives

Real-world training is critical to cybersecurity success. With DiTech Solutions Battle Paths, you ll have access to training resources designed to develop skills demanded in the workplace.
Access a cloud-based cyber range, with real IT infrastructure, real security tools, and real threats. Work through hands-on training exercises and challenges as you upskill on a variety of cybersecurity concepts. Once you ve finished your journey, you ll earn a DiTech Solutions Badge to share your achievements with your network.
Whether you re just getting started in cybersecurity or are looking to build new skills,DiTech Solutions can take your career to the next level.

 

Platform Features

  • Train in virtual environments to see tools and concepts in action
  • Develop skills with hands-on modules built by cybersecurity experts>
  • Test and validate your capabilities against real threats
  • Set goals, track progress, and train on-demand,at your own pace