OBJECTIVES
  • Analyze a security architecture for deficiencies.​

  • Discover data, applications, assets and services, and assess compliance state. ​

  • Implement technologies for enhanced prevention, detection, and response capabilities.​

  • Comprehend deficiencies in security solutions and understand how to tune and operate them.​

  • Understand the impact of ‘encrypt all’ strategies. ​

  • Apply the principles learned in the course to design a defensible security architecture ​

  • Determine appropriate security monitoring needs for organizations of all sizes. ​

  • Maximize existing investment in security architecture by reconfiguring existing technologies.​

  • Determine capabilities required to support continuous monitoring of key Critical Security Controls.​

  •  Configure appropriate logging and monitoring to support a Security Operations Center and continuous monitoring program.​

  • Design and Implement Zero Trust strategies leveraging current technologies and investment.


PROGRAMS
  • Defensible Security Architecture and Engineering: A Journey Towards Zero Trust.​

  • Network Security Architecture and Engineering.​

  • Network-Centric Security Application Security Architecture.​

  • Data-Centric Application Security Architecture.​

  • Zero-Trust Architecture: Addressing the Adversaries Already in Our Networks.​

  • Hands-On Secure-the-Flag Challenge.

PÉDAGOGIE

TRAINER: SANS INSTITUTE

Building Titan VI Zone Galaxy Andraharo 101 Antananarivo Madagascar

axian.university@axian-group.com

Building Titan VI Zone Galaxy Andraharo 101 Antananarivo Madagascar

axian.university@axian-group.com

Create a free website with Framer, the website builder loved by startups, designers and agencies.