Cyber Security Technology Professional®

cstp-virtual

Cyber Security Technology Professional®

3 Days, 1 Professional Certification

This course is designed for Cybersecurity Operation Managers® and Cybersecurity Infrastructure Experts® who are in charge of planning cybersecurity technology roadmaps. The CSTP® course unwraps the true essence of technologies in and around the application and the application ecosystem. The new trends, recommendations, and the cybersecurity components that possess the finest design and selection criteria most suitable to protect the application and its ecosystem, save costs, increase efficiency, lower risks, and offer sustainable and optimum features. Various technologies from each category are showcased and compared with the available alternatives, legacy systems and other technology routes that differ based on the solution design and strategic planning of every application ecosystem.

3 Days Classroom Session
1 Professional Certification Available
Virtual Sessions Available
Private Organization Training Available

Upcoming CSTP® Events

Sorry no post found.

Course Description

This course is designed for Cybersecurity Operation Managers® and Cybersecurity Infrastructure Experts® who are in charge of planning cybersecurity technology roadmaps. The CSTP® course unwraps the true essence of technologies in and around the application and the application ecosystem. The new trends, recommendations, and the cybersecurity components that possess the finest design and selection criteria most suitable to protect the application and its ecosystem, save costs, increase efficiency, lower risks, and offer sustainable and optimum features. Various technologies from each category are showcased and compared with the available alternatives, legacy systems and other technology routes that differ based on the solution design and strategic planning of every application ecosystem.

Who should take this course?

  • Cyber Security Professionals including but not limited
  • Security Analyst.
  • Security Engineer.
  • Security Architect.
  • Security Administrator.
  • Security Software Developer.
  • Cryptographer.
  • Cryptanalyst.
  • Security Consultant.
  • Application Developers
  • Finance Professionals
  • Data Center Designers/Engineers
  • Data Center Planners
  • Project Managers
  • Legal & Compliance Professionals
  • College Students & Graduates
  • Business Continuity Experts

what you study

The course explores the new trends, recommendations, and the cybersecurity technology components that possess the finest design and selection criteria most suitable to each of the Application Ecosystem Layers (AE).

Learning Outcomes

  • Learn how to select and cyber security technology products
  • Learn how to differentiate between different cyber security technologies
  • Learn about the best cyber security technologies to each AE layer
  • Become a cyber security expert in specifying and choosing the right mix of technology products to meet your cyber security needs
  • Understand the pros and cons of each technology
  • Observe the influence of cyber security technologies on application design and network design beyond the perimeter

PREREQUISITES

  • Cyber Security Infrastructure Specialist®
  • Cyber Security Engineering Specialist®
  • Cyber Security Operations Specialist®

Course Features

  • Course Code CSTP
  • Sessions 3
  • Duraion 3 Days
  • Track Cyber Security Management &
    Engineering
  • Language English
  • Public Yes
  • Virtual Availability Yes
  • Private Availability Yes
  • Certificate Yes
  • Assessment Yes
  • Day 1

    Network Security Systems Technologies

    • Network Access Control
    • ZTNA (Zero Trust Network Access) as a Service
    • Network Detection and Response (NDR)
    • Unified Threat Management (UTM)
    • Microsegmentation Software
    • Firewalls
    • Intrusion Detection and Prevention Software
    • SSL/TLS Decryption
    • SSL VPN
    • Firewall Security Management
    • Advanced Threat Protection
    • IoT Security
    • Enterprise Infrastructure VPN

    Enterprise Networking Technologies

    • Network Virtualization
    • Wireless LAN
    • Wireless WAN
    • WAN Edge
    • Web Security Gateways

    Internet Management Technologies

    • Internet Security
    • DNS Security

    Security Services Technologies

    • Managed Security Services
    • Customer Identity and Access Management
    • Managed Detection and Response (MDR)
    • Web Application Firewall (WAF)
    • DDoS
    • Privileged Access Management

    Application Security Technologies

    • Application Security
    • Software Configuration Management
    • Patch Management

    Day 2

    Security Software Technologies:

    • Virtualization Security
    • Mobile Identity Solutions
    • Container Security
    • Threat Intelligence Platforms
    • Security Incident Response
    • Directory Servers
    • Active Directory Bridge
    • Digital Asset Security Platforms
    • Extended Detection and Response (XDR)
    • Endpoint Detection and Response (EDR)
    • Cloud Workload Security
    • Mobile Threat Defense
    • Single Sign-On (SSO)
    • Data Loss Prevention
    • Security Information and Event Management (SIEM)
    • Vulnerability Management
    • Endpoint Protection (EPP) for Business
    • Fraud Detection and Prevention
    • Web Content Filtering
    • Identity Management (IM)
    • Endpoint Encryption
    • Mobile Data Protection
    • Cloud Access Security Brokers
    • Access Management
    • Security Orchestration Automation and Response (SOAR)
    • Active Directory Management
    • Secure Access Service Edge (SASE)
    • Enterprise Password Managers
    • User Behavior Analytics - UEBA
    • Cloud and Data Center Security
    • Endpoint Compliance
    • Identity and Access Management as a Service (IDaaS)
    • Anti-Malware Tools

    Day 3

    Access Control Technologies:

    • Physical Access Control
    • Barriers
    • Bollards
    • Turnstiles and Portals
    • Guard Facilities

    Token and Cipher Systems:

    • Identification Cards and Badges
    • Keycard Door Systems
    • Cipher Lock
    • Magnetic Stripe Cards
    • Contact Smart Card
    • Contactless Smart Card
    • Wiegand Cards
    • Key Fobs

    Biometric Access Control Technologies:

    • Facial Recognition
    • Fingerprint Recognition
    • Hand/Finger Geometry Recognition
    • Vascular Pattern Recognition
    • Iris Recognition
    • Retina Scan
    • Voice Recognition
    • Signature Dynamics Recognition
    • Multimodal

    Examination

    IDCA Courses

    Save & Share Cart
    Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
    Back Save & Share Cart
    Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
    Your cart email sent successfully :)