CYBER SECURITY Online Training by Muthu Kannan

Description

Strong leadership skills with strategic and analytical project management experience; results orientated and highly credible, with a natural talent to articulate a clear vision of the future and to achieve full buy-in from all levels of stakeholders.

A customer-focused, self-motivated and resourceful individual who has a
passion for delivery training. Experience managing full project life cycle from requirements gathering to final implementation and customer training.

Proven skills on Bluecoat Proxy SG/Content analysis/ Malware analysis/ cloud proxy, Zscaler cloud proxy, Incident responds: Carbonblack response,Endpoint detection and responds tools: Carbonblack defenses and FortiGate sandbox.


Training Outcome
  • Course Completion Certificate

  • Live one to one classes

  • Better Job prospects


Requirements
  • Four-year Bachelor's Degree

Lessons

  • 69 Lessons
  • 111:30:00 Hours
  • Introduction01:00:00
  • Web Security Gateway01:00:00
  • Overview of web-based threats that are blocked03:00:00
  • Features and Benefits SSL Inspection02:00:00
  • Content Filtering02:00:00
  • Application Control01:00:00
  • Deployment options01:00:00
  • Barracuda Reporting Server01:00:00
  • Sizing and Product Selection01:00:00
  • Console demo05:00:00
  • Detail draft about feature and troubleshooting steps about Proxy01:30:00
  • Architecture of Sandboxing01:30:00
  • Introduction01:00:00
  • Web Security Gateway01:00:00
  • Marketplace Overview02:00:00
  • Features and Benefits02:00:00
  • Deployment Options02:00:00
  • Sizing and Product Selection01:00:00
  • Console demo05:00:00
  • Detail draft about feature and troubleshooting steps01:30:00
  • Frequently Asked Questions01:00:00
  • Introduction01:00:00
  • Web application firewall01:00:00
  • Marketplace Overview02:00:00
  • Features and Benefits02:00:00
  • Deployment Options02:00:00
  • Sizing and Product Selection01:00:00
  • Console Demo (including practical session)05:00:00
  • Detail draft about feature and troubleshooting steps01:30:00
  • Frequently Asked Questions01:00:00
  • Introduction01:00:00
  • Crowdstrike Falcon01:00:00
  • Architecture of Antivirus01:30:00
  • Different between signature DB01:00:00
  • Artificial Intelligence and Machine learning01:00:00
  • Features and Benefits02:00:00
  • Deployment Options02:00:00
  • Sizing and Product Selection01:00:00
  • Console Demo and Live use cases related zero-day attack (including practical session)05:00:00
  • Detail draft about feature and troubleshooting steps01:30:00
  • Frequently Asked Questions01:00:00
  • Admin Tasks01:00:00
  • Settings: Custom Roles & Admins01:00:00
  • Evaluating Risk Insights Data and Apps02:00:00
  • General Policies Part 1: Profile & Template Creation02:00:00
  • General Policies Part 2: Policy Creation01:00:00
  • General Policies Part 3: Working with Email Notifications02:00:00
  • Netskope Data Loss Prevention Part 1: Overview & Offerings02:00:00
  • Netskope Data Loss Prevention Part 2: Setting Your Parameters–Basic & Advanced02:00:00
  • DLP Rules and Profiles01:00:00
  • Netkope Data Loss Prevention Part 3: Putting DLP into Action–Setting Policies01:00:00
  • Managing Incidents, and Fine-tuning Policies01:00:00
  • Threat Protection & Threat Protection Policies01:00:00
  • Netskope for IAAS00:30:00
  • Netskope for Web00:30:00
  • Investigating Alerts, Policy Violations, and Activity: SkopeIT Admin Tasks01:00:00
  • Investigating Alerts, Policy Violations, and Activity and Acting: Introspection and Incidents01:00:00
  • Ongoing Maintenance01:00:00
  • Monitoring00:30:00
  • Troubleshooting00:30:00
  • Netskope for Private Access00:30:00
  • Preparation: Know Your Environment02:00:00
  • USM Anywhere Tuning01:00:00
  • Threat Intelligence: Detect and Research Threats / Attack Methods02:00:00
  • Detection: Evaluate Alarms and Events05:00:00
  • Containment and Response: Minimizing Impact and Automating Response02:00:00
  • Root Cause Analysis: Trace Security Incident Timelines02:00:00
  • Recovery: Recover from an Incident02:00:00
  • Reporting: Compliance and Reporting01:00:00

About instructor

Instructor
Name : Course Monkey
Reviews : 2 Reviews
Student : 1 Students
Courses : 46 Courses

Reviews

0
Based on 0 Reviews
1 Stars
2 Stars
3 Stars
4 Stars
5 Stars