Laserfiche WebLink
(Track Five) <br />General Course Description <br />This program addresses information technology security at the top level. The CompTIA Advanced Security Practitioner <br />(CASP+) course designates IT professionals with advanced -level security skills and knowledge. The CHFI Course will fortify <br />the application knowledge of law enforcement personnel, system administrators, security officers, defense and military <br />personnel, legal professionals, bankers, security professionals and anyone who is concerned about the integrity of the network <br />infrastructure. The Certified Ethical Hacker (CEH) course will immerse the students into a hands-on environment where they will <br />be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information <br />security posture in their organizations; by hacking it. They will scan, test, hack and secure their own systems. Students will also <br />learn business soft skills which will teach team to work under the pressure along with getting the results they want through <br />effective communication. <br />Admissions Requirement: See Page 288 "Admissions Process" <br />Minimum of prior education: Basic knowledge of PC desktop operation or equivalence <br />Minimum graduation requirements: Attendance 80%, Exams passed at 70% <br />Instruction Mode: Classroom, Online, Hybrid <br />Prerequisites <br />A Basic knowledge of PC desktop operation or equivalency is required. <br />Acquired Skills <br />Students will learn to analyze and apply advanced security concepts, principles, and implementations that contribute to <br />enterprise -level security. You will: - Support IT governance in the enterprise with an emphasis on managing risk. - Leverage <br />collaboration tools and technology to support enterprise security. - Use research and analysis to secure the enterprise. - <br />Integrate advanced authentication and authorization techniques. - Implement cryptographic techniques, security controls for <br />hosts and mobile devices, network security, and security in the systems and software development lifecycle. - Integrate hosts, <br />storage, networks, applications, virtual environments, and cloud technologies in a secure enterprise architecture. - Conduct <br />security assessments; responding to and recovering from security incidents. Computer forensics enables the systematic and <br />careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker <br />through a client's systems, to tracing the originator of defamatory emails, to recovering signs of fraud. Overview of Current <br />Security Trends Understanding Elements of Information Security Understanding Information Security Threats and Attack <br />Vectors Overview of hacking concepts, types, and phases Understanding ethical hacking concepts and scope Overview of <br />information security management and defense -in-depth Overview of policies, procedures, and awareness Overview of physical <br />security and controls Understanding incidence management process Overview of vulnerability assessment and penetration <br />testing Overview of information security acts and laws. - Develop a leadership style that gets results - Employ suitable <br />motivation techniques for your team - Adapt your communication style and use influence skills to drive direction - Empower your <br />team to get the results you want <br />Job Titles (Job Titles related to IT Training stretch Horizontally, they can vastly vary, the list below is a <br />sampling but not limited to) <br />(SOC)15-1200 Computer Occupations <br />IT Security Analyst Cybersecurity Analyst <br />Vulnerability Analyst Cybersecurity Specialist <br />Threat Intelligence Analyst Security Engineer <br />Computer Network Administrators Computer Support Users <br />Course Information <br />