Cyber Security Technology Professional®
Cyber Security Technology Professional®
3 Days, 1 Professional Certification
This course is designed for Cybersecurity Operation Managers® and Cybersecurity Infrastructure Experts® who are in charge of planning cybersecurity technology roadmaps. The CSTP® course unwraps the true essence of technologies in and around the application and the application ecosystem. The new trends, recommendations, and the cybersecurity components that possess the finest design and selection criteria most suitable to protect the application and its ecosystem, save costs, increase efficiency, lower risks, and offer sustainable and optimum features. Various technologies from each category are showcased and compared with the available alternatives, legacy systems and other technology routes that differ based on the solution design and strategic planning of every application ecosystem.
Upcoming CSTP® Events
Sorry no post found.
Course Description
This course is designed for Cybersecurity Operation Managers® and Cybersecurity Infrastructure Experts® who are in charge of planning cybersecurity technology roadmaps. The CSTP® course unwraps the true essence of technologies in and around the application and the application ecosystem. The new trends, recommendations, and the cybersecurity components that possess the finest design and selection criteria most suitable to protect the application and its ecosystem, save costs, increase efficiency, lower risks, and offer sustainable and optimum features. Various technologies from each category are showcased and compared with the available alternatives, legacy systems and other technology routes that differ based on the solution design and strategic planning of every application ecosystem.
Who should take this course?
- Cyber Security Professionals including but not limited
- Security Analyst.
- Security Engineer.
- Security Architect.
- Security Administrator.
- Security Software Developer.
- Cryptographer.
- Cryptanalyst.
- Security Consultant.
- Application Developers
- Finance Professionals
- Data Center Designers/Engineers
- Data Center Planners
- Project Managers
- Legal & Compliance Professionals
- College Students & Graduates
- Business Continuity Experts
what you study
The course explores the new trends, recommendations, and the cybersecurity technology components that possess the finest design and selection criteria most suitable to each of the Application Ecosystem Layers (AE).
Learning Outcomes
- Learn how to select and cyber security technology products
- Learn how to differentiate between different cyber security technologies
- Learn about the best cyber security technologies to each AE layer
- Become a cyber security expert in specifying and choosing the right mix of technology products to meet your cyber security needs
- Understand the pros and cons of each technology
- Observe the influence of cyber security technologies on application design and network design beyond the perimeter
PREREQUISITES
- Cyber Security Infrastructure Specialist®
- Cyber Security Engineering Specialist®
- Cyber Security Operations Specialist®
Course Features
Engineering
Day 1
Network Security Systems Technologies
Network Access Control
ZTNA (Zero Trust Network Access) as a Service
Network Detection and Response (NDR)
Unified Threat Management (UTM)
Microsegmentation Software
Firewalls
Intrusion Detection and Prevention Software
SSL/TLS Decryption
SSL VPN
Firewall Security Management
Advanced Threat Protection
IoT Security
Enterprise Infrastructure VPN
Enterprise Networking Technologies
Network Virtualization
Wireless LAN
Wireless WAN
WAN Edge
Web Security Gateways
Internet Management Technologies
Internet Security
DNS Security
Security Services Technologies
Managed Security Services
Customer Identity and Access Management
Managed Detection and Response (MDR)
Web Application Firewall (WAF)
DDoS
Privileged Access Management
Application Security Technologies
Application Security
Software Configuration Management
Patch Management
Day 2
Security Software Technologies:
Virtualization Security
Mobile Identity Solutions
Container Security
Threat Intelligence Platforms
Security Incident Response
Directory Servers
Active Directory Bridge
Digital Asset Security Platforms
Extended Detection and Response (XDR)
Endpoint Detection and Response (EDR)
Cloud Workload Security
Mobile Threat Defense
Single Sign-On (SSO)
Data Loss Prevention
Security Information and Event Management (SIEM)
Vulnerability Management
Endpoint Protection (EPP) for Business
Fraud Detection and Prevention
Web Content Filtering
Identity Management (IM)
Endpoint Encryption
Mobile Data Protection
Cloud Access Security Brokers
Access Management
Security Orchestration Automation and Response (SOAR)
Active Directory Management
Secure Access Service Edge (SASE)
Enterprise Password Managers
User Behavior Analytics - UEBA
Cloud and Data Center Security
Endpoint Compliance
Identity and Access Management as a Service (IDaaS)
Anti-Malware Tools
Day 3
Access Control Technologies:
Physical Access Control
Barriers
Bollards
Turnstiles and Portals
Guard Facilities
Token and Cipher Systems:
Identification Cards and Badges
Keycard Door Systems
Cipher Lock
Magnetic Stripe Cards
Contact Smart Card
Contactless Smart Card
Wiegand Cards
Key Fobs
Biometric Access Control Technologies:
Facial Recognition
Fingerprint Recognition
Hand/Finger Geometry Recognition
Vascular Pattern Recognition
Iris Recognition
Retina Scan
Voice Recognition
Signature Dynamics Recognition
Multimodal