CYBER SECURITY Online Training by Muthu Kannan
Description
Strong leadership skills with strategic and analytical project management experience; results orientated and highly credible, with a natural talent to articulate a clear vision of the future and to achieve full buy-in from all levels of stakeholders.
A customer-focused, self-motivated and resourceful individual who has a
passion for delivery training. Experience managing full project life cycle from requirements gathering to final implementation and customer training.
Proven skills on Bluecoat Proxy SG/Content analysis/ Malware analysis/ cloud proxy, Zscaler cloud proxy, Incident responds: Carbonblack response,Endpoint detection and responds tools: Carbonblack defenses and FortiGate sandbox.
Training Outcome
-
Course Completion Certificate
-
Live one to one classes
-
Better Job prospects
Requirements
- Four-year Bachelor's Degree
Lessons
- 69 Lessons
- 111:30:00 Hours
- Introduction01:00:00
- Web Security Gateway01:00:00
- Overview of web-based threats that are blocked03:00:00
- Features and Benefits SSL Inspection02:00:00
- Content Filtering02:00:00
- Application Control01:00:00
- Deployment options01:00:00
- Barracuda Reporting Server01:00:00
- Sizing and Product Selection01:00:00
- Console demo05:00:00
- Detail draft about feature and troubleshooting steps about Proxy01:30:00
- Architecture of Sandboxing01:30:00
- Introduction01:00:00
- Web Security Gateway01:00:00
- Marketplace Overview02:00:00
- Features and Benefits02:00:00
- Deployment Options02:00:00
- Sizing and Product Selection01:00:00
- Console demo05:00:00
- Detail draft about feature and troubleshooting steps01:30:00
- Frequently Asked Questions01:00:00
- Introduction01:00:00
- Web application firewall01:00:00
- Marketplace Overview02:00:00
- Features and Benefits02:00:00
- Deployment Options02:00:00
- Sizing and Product Selection01:00:00
- Console Demo (including practical session)05:00:00
- Detail draft about feature and troubleshooting steps01:30:00
- Frequently Asked Questions01:00:00
- Introduction01:00:00
- Crowdstrike Falcon01:00:00
- Architecture of Antivirus01:30:00
- Different between signature DB01:00:00
- Artificial Intelligence and Machine learning01:00:00
- Features and Benefits02:00:00
- Deployment Options02:00:00
- Sizing and Product Selection01:00:00
- Console Demo and Live use cases related zero-day attack (including practical session)05:00:00
- Detail draft about feature and troubleshooting steps01:30:00
- Frequently Asked Questions01:00:00
- Admin Tasks01:00:00
- Settings: Custom Roles & Admins01:00:00
- Evaluating Risk Insights Data and Apps02:00:00
- General Policies Part 1: Profile & Template Creation02:00:00
- General Policies Part 2: Policy Creation01:00:00
- General Policies Part 3: Working with Email Notifications02:00:00
- Netskope Data Loss Prevention Part 1: Overview & Offerings02:00:00
- Netskope Data Loss Prevention Part 2: Setting Your Parameters–Basic & Advanced02:00:00
- DLP Rules and Profiles01:00:00
- Netkope Data Loss Prevention Part 3: Putting DLP into Action–Setting Policies01:00:00
- Managing Incidents, and Fine-tuning Policies01:00:00
- Threat Protection & Threat Protection Policies01:00:00
- Netskope for IAAS00:30:00
- Netskope for Web00:30:00
- Investigating Alerts, Policy Violations, and Activity: SkopeIT Admin Tasks01:00:00
- Investigating Alerts, Policy Violations, and Activity and Acting: Introspection and Incidents01:00:00
- Ongoing Maintenance01:00:00
- Monitoring00:30:00
- Troubleshooting00:30:00
- Netskope for Private Access00:30:00
- Preparation: Know Your Environment02:00:00
- USM Anywhere Tuning01:00:00
- Threat Intelligence: Detect and Research Threats / Attack Methods02:00:00
- Detection: Evaluate Alarms and Events05:00:00
- Containment and Response: Minimizing Impact and Automating Response02:00:00
- Root Cause Analysis: Trace Security Incident Timelines02:00:00
- Recovery: Recover from an Incident02:00:00
- Reporting: Compliance and Reporting01:00:00
About instructor

Reviews
0
Based on 0 Reviews
1 Stars
2 Stars
3 Stars
4 Stars
5 Stars