Security Management
Course Overview
Assessing Information Security Risk
The Importance of Risk Management, Integrating Documentation into Risk Management (Part 1), Integrating Documentation into Risk Management (Part 2)
Responding to Cybersecurity Incidents
Deploy an Incident Handling and Response Architecture (Part 1), Deploy an Incident Handling and Response Architecture (Part 2), Deploy an Incident Handling and Response Architecture (Part 3), Contain and Mitigate Incidents (Part 1), Contain and Mitigate Incidents (Part 2),Prepare for Forensic Investigation as a CSIRT
Investigating Cybersecurity Incidents
Apply a Forensic Investigation (Part 1), Apply a Forensic Investigation (Part 2), Securely Collect and Analyze Electronic Evidence, Follow Up on the Results of an Investigation, Complying With State, Federal and National Legislation
Objectives
Real-world training is critical to cybersecurity success. With DiTech Solutions Battle Paths, you ll have access to training resources designed to develop skills demanded in the workplace.
Access a cloud-based cyber range, with real IT infrastructure, real security tools, and real threats. Work through hands-on training exercises and challenges as you upskill on a variety of cybersecurity concepts. Once you ve finished your journey, you ll earn a DiTech Solutions Badge to share your achievements with your network.
Whether you re just getting started in cybersecurity or are looking to build new skills,DiTech Solutions can take your career to the next level.
Platform Features
- Train in virtual environments to see tools and concepts in action
- Develop skills with hands-on modules built by cybersecurity experts>
- Test and validate your capabilities against real threats
- Set goals, track progress, and train on-demand,at your own pace
Course Overview
Assessing Information Security Risk
The Importance of Risk Management, Integrating Documentation into Risk Management (Part 1), Integrating Documentation into Risk Management (Part 2)
Responding to Cybersecurity Incidents
Deploy an Incident Handling and Response Architecture (Part 1), Deploy an Incident Handling and Response Architecture (Part 2), Deploy an Incident Handling and Response Architecture (Part 3), Contain and Mitigate Incidents (Part 1), Contain and Mitigate Incidents (Part 2),Prepare for Forensic Investigation as a CSIRT
Investigating Cybersecurity Incidents
Apply a Forensic Investigation (Part 1), Apply a Forensic Investigation (Part 2), Securely Collect and Analyze Electronic Evidence, Follow Up on the Results of an Investigation, Complying With State, Federal and National Legislation
Objectives
Real-world training is critical to cybersecurity success. With DiTech Solutions Battle Paths, you ll have access to training resources designed to develop skills demanded in the workplace.
Access a cloud-based cyber range, with real IT infrastructure, real security tools, and real threats. Work through hands-on training exercises and challenges as you upskill on a variety of cybersecurity concepts. Once you ve finished your journey, you ll earn a DiTech Solutions Badge to share your achievements with your network.
Whether you re just getting started in cybersecurity or are looking to build new skills,DiTech Solutions can take your career to the next level.
Platform Features
- Train in virtual environments to see tools and concepts in action
- Develop skills with hands-on modules built by cybersecurity experts>
- Test and validate your capabilities against real threats
- Set goals, track progress, and train on-demand,at your own pace