Digital Risk Protection Officer Training
Course
Online
Description
-
Type
Course
-
Level
Advanced
-
Methodology
Online
-
Duration
1 Year
-
Start date
Different dates available
-
Online campus
Yes
-
Delivery of study materials
Yes
-
Support service
Yes
-
Virtual classes
Yes
Protect your computer’s system and networks, and keep your data safe from hackers and cyber attacks with the Digital Risk Protection Officer Training course. This cybersecurity training course provides essential training on risk management.
In this course, you will learn how to protect against viruses and malicious threats through risk mitigation, penetration testing, and malware analysis. You will also be trained on how to identify risks and respond to threats and will be introduced to analytical techniques for securing your WLAN network.
Facilities
Location
Start date
Start date
About this course
Learn the basics of cybersecurity risk management and risk assessment
Understand the different types of risk mitigation: risk avoidance, acceptance, transference & limitation.
Discover tips & tricks for analysing attacks and assessing the impact of threats
Learn post-attack techniques and how to implement a forensic investigation plan
Familiarise with WLAN digital security networking basics
Understand the different types of authentication and the authentification process in network security
Learn how encryption helps to keep your personal and private data secure
Understand how to protect yourself against wireless security hacks
This cybersecurity training course is ideal for aspiring information security analysists and cybersecurity professionals. It will also benefit anyone who wishes to protect their sensitive data online.
Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of 9.99 and PDF Certificate at 4.99.
Earn a free e-certificate upon successful completion.
Accessible, informative modules taught by expert instructors
Study in your own time, at your own pace, through your computer tablet or mobile device
Benefit from instant feedback through mock exams and multiple-choice assessments
Get 24/7 help or advice from our email and live chat teams
Full Tutor Support on Weekdays
Reviews
Subjects
- Risk
- Monitoring
- Access
- Risk Management
- Governance
- Web
- Collecting
- Network
- Linux
- Windows
- Testing
- Healthcare
- Engineering
- Management of Risk
- Wireless
- Network Training
Course programme
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
- Classify Threats and Threat Profiles
- Perform Ongoing Threat Research
- Resources that Aid in Research of Threats
- Implement Threat Modeling
- Assess the Impact of Reconnaissance Incidents
- Performing Reconnaissance on a Network
- Examining Reconnaissance Incidents
- Assess the Impact of Social Engineering
- Assessing the impact of Social Engineering
- Assessing the Impact of Phishing
- Assess the Impact of System Hacking Attacks
- Cracking Passwords Using a Password File
- Assess the Impact of Web Based Attacks
- Assessing the Impact of Web-Based Threats
- Assess the Impact of Malware
- Malware Detection and Removal
- Assess the Impact of Hijacking and Impersonation Attacks
- Assess the Impact of DoS Incidents
- Assessing the Impact of DoS Attacks
- Assess the Impact of Threats to Mobile Security
- Assess the Impact of Threats to Cloud Security
- Assess Command and Control Techniques
- Assessing Command and Control Techniques
- Assess Persistence Techniques
- Detecting Rootkits
- Assess Lateral Movement and Pivoting Techniques
- Assess Data Exfiltration Techniques
- Steganography
- Assess Anti Forensics Techniques
- Assessing Anti-Forensics
- Conduct Vulnerability Assessments
- Perform a Vulnerability Scan with Nessus
- Perform a Vulnerability Scan with MBSA
- Conduct Penetration Tests on Network Assets
- Follow Up on Penetration Testing
- Deploy a Security Intelligence Collection and Analysis Platform
- Collect Data from Network Based Intelligence Sources
- Collecting Network-Based Security Intelligence
- Collect Data from Host Based Intelligence Sources
- Collecting Host-Based Security Intelligence
- Parsing Log files
- Use Common Tools to Analyze Logs
- Analyzing Linux Logs for Security Intelligence
- Use SIEM Tools for Analysis
- Incorporating SIEMs into Security Intelligence Analysis
- Parse Log Files with Regular Expressions
- Analyze Incidents with Windows-Based Tools
- Windows-Based Incident Analysis Tools
- Analyze Incidents with Linux Based Tools
- Linux-Based Incident Analysis Tools
- Analyze Malware
- Analyzing Malware
- Analyze Indicators of Compromise
- Analyzing Indicators of Compromise
- Deploy an Incident Handling and Response Architecture
- Mitigate Incidents
- Hardening Windows Servers
- DNS Filtering
- Blacklisting and Whitelisting
- Prepare for Forensic Investigation as a CSIRT
- Apply a Forensic Investigation Plan
- Securely Collect and Analyze Electronic Evidence
- Securely Collecting Electronic Evidence
- Follow Up on the Results of an Investigation
- WLAN Security Overview and Data Privacy
- Networking Basics
- Web GUI Introduction
- Security Options
- Legacy Security
- VPNs
- Security Association
- MAC Spoofing
- Encryption Ciphers and Methods
- TKIP
- CCMP
- Encryption Examples
- 802.11 Authentication Methods
- 802.1X
- Certified Authority Server Credentials
- Dynamic Encryption Key Generation
- Authentication and Key Management
- RSNA Key Hierarchy
- EAP
- Information Elements
- SOHO 802.11 Security
- Wi-Fi Protected Setup (WPS)
- Cracking Hashes
- Fast Secure Roaming
- PMKSA
- FT Key Hierarchy (e-notes)
- 802.11K-2008
- Wireless Security Risks
- Authentication Attacks
- Rogue Devices
- Public Hotspots
- Wireless LAN Security Auditing
- Wireless Security Monitoring
- Device Tracking
- VPNs, Remote Access and Guest Access Services
- Remote Access
- WLAN Security Infrastructure
- Management Protocols
- Other RADIUS Solutions
- Wireless Security Policies
- Other Policies
- Information Security Governance Overview
- Effective Information Security Governance
- Information Security Concepts and Technologies
- Information Security Manager
- Scope and Charter of Information Security Governance
- Information Security Governance Metrics
- Information Security Strategy Overview
- Creating Information Security Strategy
- Determining Current State Of Security
- Information Security Strategy Development
- Strategy Resources
- Strategy Constraints
- Action Plan to Implement Strategy
- Risk Management Overview
- Good Information Security Risk Management
- Information Security Risk Management Concepts
- Implementing Risk Management
- Risk Assessment
- Controls Countermeasures
- Recovery Time Objectives
- Risk Monitoring and Communication
- Development of Information Security Program
- Information Security Program Objectives
- Information Security Program Development Concepts
- Scope and Charter of Information Security Program Development
- Information Security Management Framework
- Information Security Framework Components
- Information Security Program Resources
- Implementing an Information Security Program
- Information Infrastructure and Architecture
- Information Security Program
- Security Program Services and Operational Activities
- Incident Management Overview
- Incident Response Procedures
- Incident Management Organization
- Incident Management Resources
- Incident Management Objectives
- Incident Management Metrics and Indicators
- Current State of Incident Response Capability
- BCP DRP
- Testing Response and Recovery Plans
- Executing the Plan
- The Healthcare Industry
- The Healthcare Regulatory Environment
- Privacy and Security in Healthcare
- Information Governance and Risk Management
- Information Risk Assessment
- Third-Party Risk Management
- Welcome to Disaster Recovery Training
- Business Impact Analysis
- Risk Analysis8
- BCP Strategies
- IT Recovery Strategies
- Implementation Phase
- Testing and Exercise
- Maintenance and Updating
- Execution Phase
- Introduction
- Computer Forensic Incidents
- Investigation Process
- Disk Storage Concepts
- Digital Acquisition & Analysis
- Forensic Examination Protocols
- Digital Evidence Protocols
- CFI Theory
- Digital Evidence Presentation
- Computer Forensic Laboratory Protocols
- Computer Forensic Processing
- Digital Forensics Reporting
- Specialized Artifact Recovery
- Discovery and ESI
- Cell Phone Forensics
- USB Forensics
- Incident Handling
- PDA Forensics
- Investigating Harassment
- Introduction
- Threats, Vulnerabilities and Exploits
- IH Preparation
- Request Tracker for Incident Handling
- Preliminary Response
- Identification and Initial Response
- Sysinternals
- Containment
- Eradication
- Follow-up
- Recovery
- Virtualization Security
- Malware Incident Handling
- Security Management
- Risk Management
- Encryption
- Information Security – Access Control Concepts
- Incident Handling and Evidence
- Operations Security
- Knowing Network Security
- Basic Security
- User Awareness 33
- Implementing Countermeasures
- Certified Security Sentinel
- Using the Internet at Work 444
- Accessing the Company’s Network Through Your Assigned Computer
- Accessing the Corporate Network Remotely
- Social Engineering
- Understanding and Manipulating our Target
- Researching Our Target
Digital Risk Protection Officer Training