This course highlights best practices applicable to a wide variety cybersecurity job roles. Topics include risk management, architecture and design, and tools and technologies. This course also covers key concepts for detecting, protecting, and defending from security threats.
- List common cyber threats and how scanning and assessment tools and techniques identify potential vulnerabilities.
- Explain how various tools and technologies are configured or deployed to support an organization's security posture.
- Detail risk management best practices and mitigation strategies.