OBJECTIVES
Analyze a security architecture for deficiencies.
Discover data, applications, assets and services, and assess compliance state.
Implement technologies for enhanced prevention, detection, and response capabilities.
Comprehend deficiencies in security solutions and understand how to tune and operate them.
Understand the impact of ‘encrypt all’ strategies.
Apply the principles learned in the course to design a defensible security architecture
Determine appropriate security monitoring needs for organizations of all sizes.
Maximize existing investment in security architecture by reconfiguring existing technologies.
Determine capabilities required to support continuous monitoring of key Critical Security Controls.
Configure appropriate logging and monitoring to support a Security Operations Center and continuous monitoring program.
Design and Implement Zero Trust strategies leveraging current technologies and investment.
PROGRAMS
Defensible Security Architecture and Engineering: A Journey Towards Zero Trust.
Network Security Architecture and Engineering.
Network-Centric Security Application Security Architecture.
Data-Centric Application Security Architecture.
Zero-Trust Architecture: Addressing the Adversaries Already in Our Networks.
Hands-On Secure-the-Flag Challenge.
PÉDAGOGIE
TRAINER: SANS INSTITUTE


