Description
- THREATS, ATTACKS & VULNERABILITIES
- Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
- WINDOWS OPERATING SYSTEMS
- TECHNOLOGIES & TOOLS
- Install and configure identity and access services, as well as management controls
- HARDWARE & NETWORK TROUBLESHOOTING
- RISK MANAGEMENT
- Implement and summarize risk management best practices and the business impact
Target Audience
- Systems Administrator
- Network Administrator
- Security Administrator
- Junior IT Auditor/ Penetration Tester