Cisco træning

Insoft Services er en af de få uddannelsesudbydere i EMEAR, der tilbyder hele spektret af Cisco-certificering og specialiseret teknologiuddannelse.

Lær hvordan

Cisco-certificeringer

Oplev en blandet læringsmetode, der kombinerer det bedste fra instruktørstyret træning og e-læring i eget tempo for at hjælpe dig med at forberede dig til din certificeringseksamen.

Lær hvordan

Cisco Learning Credits

Cisco Learning Credits (CLCs) er forudbetalte træningskuponer, der indløses direkte med Cisco, og som gør det nemmere at planlægge din succes, når du køber Cisco-produkter og -tjenester.

Lær hvordan

Cisco Efteruddannelse

Cisco Continuing Education Program tilbyder alle aktive certificeringsindehavere fleksible muligheder for at gencertificere ved at gennemføre en række kvalificerede træningselementer.

Lær hvordan

Cisco Digital Learning

Certificerede medarbejdere er VÆRDSATTE aktiver. Udforsk Ciscos officielle digitale læringsbibliotek for at uddanne dig selv gennem optagede sessioner.

Lær hvordan

Cisco Business Enablement

Cisco Business Enablement Partner Program fokuserer på at skærpe Cisco Channel Partners og kunders forretningsmæssige færdigheder.

Lær hvordan

Cisco kursuskatalog

Lær hvordan

Fortinet-certificeringer

Fortinet Network Security Expert (NSE) -programmet er et otte-niveau uddannelses- og certificeringsprogram for at undervise ingeniører i deres netværkssikkerhed for Fortinet FW-færdigheder og erfaring.

Lær hvordan

Fortinet træning

Insoft er anerkendt som Autoriseret Fortinet Training Center på udvalgte steder på tværs af EMEA.

Tekniske kurser

Fortinet kursuskatalog

Udforsk hele Fortinet-træningskataloget. Programmet omfatter en bred vifte af selvstændige og instruktørledede kurser.

Lær hvordan

ATC-status

Tjek vores ATC-status på tværs af udvalgte lande i Europa.

Lær hvordan

Fortinet Professionelle Services

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Lær hvordan

Microsoft træning

Insoft Services tilbyder Microsoft-undervisning i EMEAR. Vi tilbyder Microsoft tekniske kurser og certificeringskurser, der ledes af instruktører i verdensklasse.

Tekniske kurser

Extreme træning

Find all the Extreme Networks online and instructor led class room based calendar here.

Tekniske kurser

Tekniske certificeringer

Vi leverer omfattende læseplan for tekniske kompetencefærdigheder på certificeringspræstationen.

Lær hvordan

Extreme kursuskatalog

Lær hvordan

ATP-akkreditering

Som autoriseret uddannelsespartner (ATP) sikrer Insoft Services, at du får de højeste uddannelsesstandarder, der findes.

Lær hvordan

Løsninger og tjenester

Vi leverer innovativ og avanceret support til design, implementering og optimering af IT-løsninger. Vores kundebase omfatter nogle af de største Telcos globalt.

Lær hvordan

Globalt anerkendte team af certificerede eksperter hjælper dig med at gøre en mere jævn overgang med vores foruddefinerede konsulent-, installations- og migreringspakker til en lang række Fortinet-produkter.

Om os

Insoft tilbyder autoriseret uddannelses- og konsulentbistand til udvalgte IP-leverandører. Få mere at vide om, hvordan vi revolutionerer branchen.

Lær hvordan
  • +45 32 70 99 90
  • CASP+ - CompTIA Advanced Security Practitioner

    Duration
    5 Dage
    Delivery
    (Online Og På stedet)
    Price
    Pris på forespørgsel

    This CompTIA Advanced Security Practitioner (CASP+) training course will prepare you to successfully achieve this in-demand certification and teach you to assess, investigate, examine, and research potential security threats in your organisation.

     

    In this certification training course, you will gain the foundational knowledge to fully prepare for the CASP+ exam (CAS-003). Earning CASP+ certification demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines.

     

    Associated Certification:

    • Exam Code: CAS-004
    • Successfully prepare for the CompTIA Advanced Security Practitioner (CASP+) Certification Exam
    • Investigate enterprise storage requirements
    • Examine risk management security policies and procedures
    • Research potential threats and identify appropriate countermeasures
    • Evaluate collaboration methodologies for security communications

    CASP+ Exam Overview

    • Examination and certification goals
    • The five domains of the exam
    • Learning techniques

     

    Enterprise Security

    Identifying security concerns in scenarios

    • Exploring cryptographic techniques
    • Advanced PKI concepts

    Distinguishing between cryptographic concepts

    • Entropy
    • Confusion and diffusion
    • Chain of trust

    Securing enterprise storage

    • Examining storage types and protocols
    • Secure storage management

    Analysing network security architectures

    • Designing secure networks
    • Employing virtual networking solutions

    Troubleshooting security controls for hosts

    • Host security: trusted OS, end-point, host hardening
    • Vulnerabilities in co-mingling of hosts

    Differentiating application vulnerabilities

    • Web application security
    • Application security concerns
    • Mitigating client-side vs. server-side processing

     

    Risk Management and Incident Response

    Interpreting business and industry influences and risks

    • Analysing risk scenarios
    • Identifying the impact of de-perimeterization

    Executing risk mitigation planning, strategies and control

    • Assessing the CIA aggregate scores
    • Making risk determination

    Privacy policies and procedures

    • Developing policies to support business objectives
    • Safeguarding Personally Identifiable Information (PII)

    Conduct incident response and recovery procedures

    • Constructing a data inventory with e-discovery
    • Minimising the severity of data breaches

     

    Research, Analysis and Assessment

    Determining industry trends impact to the enterprise

    • Performing ongoing research to support best practises
    • Researching security requirement for contracts

    Appropriate security document usage

    • Request for Information (RFI)
    • Request for Quote (RFQ)
    • Request for Proposal (RFP)

    Evaluating scenarios to determine how to secure the enterprise

    • Conducting cost benefit and security solution analysis
    • Reviewing effectiveness of existing security controls

    Conducting an assessment and analysing the results

    • Determining appropriate tools for data gathering
    • Identifying methods to perform assessments

     

    Integrating Computing, Communications and Business Disciplines

    Collaborating across diverse business units to achieve security goals

    • Communicating with stakeholders
    • Interpreting security requirements and providing guidance
    • Identifying secure communications goals

    Selecting controls for secure communications

    • Utilising unified collaboration tools
    • Mobile devices
    • Applying over the air technologies

    Implementing security across technology life cycle

    • Selecting security controls
    • Developing Security Requirements Traceability Matrices

     

    Technical Integration of Enterprise Components

    Integrate devices into a secure enterprise architecture

    • Securing data following existing security standards
    • Applying technical deployment models
    • Integrating storage and applications into the enterprise

    Integrating advanced authentication and authorisation technologies

    • Implementing certificate-based and SSO authentication
    • Applying federation solutions

    This course is designed for IT professionals in the cybersecurity industry whose primary job responsibility is to secure complex enterprise environments.

    • CompTIA Security + Certification or equivalent experience
    • Ten years of IT administration experience, including at least five years of hands-on technical security experience

    This CompTIA Advanced Security Practitioner (CASP+) training course will prepare you to successfully achieve this in-demand certification and teach you to assess, investigate, examine, and research potential security threats in your organisation.

     

    In this certification training course, you will gain the foundational knowledge to fully prepare for the CASP+ exam (CAS-003). Earning CASP+ certification demonstrates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications, and business disciplines.

     

    Associated Certification:

    • Exam Code: CAS-004
    • Successfully prepare for the CompTIA Advanced Security Practitioner (CASP+) Certification Exam
    • Investigate enterprise storage requirements
    • Examine risk management security policies and procedures
    • Research potential threats and identify appropriate countermeasures
    • Evaluate collaboration methodologies for security communications

    CASP+ Exam Overview

    • Examination and certification goals
    • The five domains of the exam
    • Learning techniques

     

    Enterprise Security

    Identifying security concerns in scenarios

    • Exploring cryptographic techniques
    • Advanced PKI concepts

    Distinguishing between cryptographic concepts

    • Entropy
    • Confusion and diffusion
    • Chain of trust

    Securing enterprise storage

    • Examining storage types and protocols
    • Secure storage management

    Analysing network security architectures

    • Designing secure networks
    • Employing virtual networking solutions

    Troubleshooting security controls for hosts

    • Host security: trusted OS, end-point, host hardening
    • Vulnerabilities in co-mingling of hosts

    Differentiating application vulnerabilities

    • Web application security
    • Application security concerns
    • Mitigating client-side vs. server-side processing

     

    Risk Management and Incident Response

    Interpreting business and industry influences and risks

    • Analysing risk scenarios
    • Identifying the impact of de-perimeterization

    Executing risk mitigation planning, strategies and control

    • Assessing the CIA aggregate scores
    • Making risk determination

    Privacy policies and procedures

    • Developing policies to support business objectives
    • Safeguarding Personally Identifiable Information (PII)

    Conduct incident response and recovery procedures

    • Constructing a data inventory with e-discovery
    • Minimising the severity of data breaches

     

    Research, Analysis and Assessment

    Determining industry trends impact to the enterprise

    • Performing ongoing research to support best practises
    • Researching security requirement for contracts

    Appropriate security document usage

    • Request for Information (RFI)
    • Request for Quote (RFQ)
    • Request for Proposal (RFP)

    Evaluating scenarios to determine how to secure the enterprise

    • Conducting cost benefit and security solution analysis
    • Reviewing effectiveness of existing security controls

    Conducting an assessment and analysing the results

    • Determining appropriate tools for data gathering
    • Identifying methods to perform assessments

     

    Integrating Computing, Communications and Business Disciplines

    Collaborating across diverse business units to achieve security goals

    • Communicating with stakeholders
    • Interpreting security requirements and providing guidance
    • Identifying secure communications goals

    Selecting controls for secure communications

    • Utilising unified collaboration tools
    • Mobile devices
    • Applying over the air technologies

    Implementing security across technology life cycle

    • Selecting security controls
    • Developing Security Requirements Traceability Matrices

     

    Technical Integration of Enterprise Components

    Integrate devices into a secure enterprise architecture

    • Securing data following existing security standards
    • Applying technical deployment models
    • Integrating storage and applications into the enterprise

    Integrating advanced authentication and authorisation technologies

    • Implementing certificate-based and SSO authentication
    • Applying federation solutions

    This course is designed for IT professionals in the cybersecurity industry whose primary job responsibility is to secure complex enterprise environments.

    • CompTIA Security + Certification or equivalent experience
    • Ten years of IT administration experience, including at least five years of hands-on technical security experience
      Kommende datoer
      Dato på anmodning

    Follow Up Courses

    Filtrer
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 2 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now
    • 5 Dage
      Dato på anmodning
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.