Shop

About the Course

An introduction to installing network components that can help support enterprise security.  Learn how specialized security tools like intrusion prevention systems, web application firewalls, and protocol analyzers help security professionals do their jobs. Discuss how to use the appropriate software tools to assess the security posture of an organization, including protocol analyzers, network scanners, password crackers, honeypots, and command line network tools.  Explore troubleshooting common security issues, and learn the crucial art of interpreting the results generated by intrusion detection and prevention systems, firewalls, application control technology, advanced malware tools, data loss prevention systems, and other security technologies.

Jun 03 - Dec 20, 2024

234ETF402
Est. Tuition:
$950.00
Learning Format:
Online
Duration:
29 weeks
Enroll

Estimated Tuition

$950.00

Location

Online

Instructor

  • Eric A. Nielsen, M.H.A., CISSP, C|CISO, CCSP, HCISPP, CAP, CRISC, is the CEO of Defense In-Depth Cybersecurity, and specializes in cybersecurity curriculum content development. Mr. Nielsen has an established track record of accomplishments, demonstrating subject mastery and leading functional security teams in security operations, security engineering and architecture, access and identify management, threat and vulnerability management, and security risk and compliance.

Schedule

Jun 3 - Dec. 20

Textbook

No Textbooks Listed.

Additional information

Jan 06 - Jun 02, 2025

243ETF402
Est. Tuition:
$950.00
Learning Format:
Online
Duration:
22 weeks
Enroll

Estimated Tuition

$950.00

Location

Online

Instructor

  • Eric A. Nielsen, M.H.A., CISSP, C|CISO, CCSP, HCISPP, CAP, CRISC, is the CEO of Defense In-Depth Cybersecurity, and specializes in cybersecurity curriculum content development. Mr. Nielsen has an established track record of accomplishments, demonstrating subject mastery and leading functional security teams in security operations, security engineering and architecture, access and identify management, threat and vulnerability management, and security risk and compliance.

Schedule

Jan. 6 - Jun. 2

Textbook

No Textbooks Listed.

Additional information