YoVDO

Palo Alto Networks Secure Business Systems: Administration

Offered By: Cybrary

Tags

Network Security Courses Cybersecurity Courses Incident Response Courses Malware Courses Botnets Courses

Course Description

Overview

Cyber Crime is becoming more prevalent today and businesses need to protect their systems by adopting a preventive and defensive posture. It is extremely important to understand the fundamental components of cybersecurity in order to reduce the business attack surface and minimize overall risk. This course is designed to introduce students to the cybersecurity landscape and challenges associated with protecting critical business systems.

Course Domains:

Cyber Threat Identification Business Cyber Crimes and Challenges Business Security Policy Cyber-Attack Life-Cycle

Upon completion of the course, students will be able to:

  • Identify common cyber threats and attacks
  • Understand the organization's core business/mission processes
  • Develop security policies for applications that interface with one another, such as Business-to-Business(B2B) applications.
  • Prioritize critical business functions with organizational stakeholders.

Syllabus

  • Introduction
    • Course Introduction
    • Secure Business Systems Administration Overview
    • Cybersecurity: Why it Matters
  • Cyber Threat Identification
    • Climate and Landscape
    • Malware Definition and Classification
    • Vulnerabilities and Exploits
    • Bots and Botnets
    • Cyber Threats and Attacks
    • Major Threat Actors
    • Cyber Attack Techniques and Types
    • Wifi and Advanced Persistent Threats
    • Palo Alto Secure Business Systems Administration Module 2 Quiz
  • Cyber Crimes and Challenges
    • Employee Cybersecurity Challenges
    • Notable Business Cyber Crimes
    • High Profile Attacks
    • Cyber-Attack Lifecycle
    • Palo Alto Secure Business Systems Administration Module 3 Quiz
  • Business Security Policy
    • Business Security Policy Overview and Planning
    • Acceptable Use and Password Policies
    • Policy Enforcement and Incident Response
    • Compliance Challenges
    • Palo Alto Secure Business Systems Administration Module 4 Quiz
  • Restoration
    • Mitigation
    • Restoration
    • Cyber-Attack Lifecycle: Attack
    • Cyber-Attack Lifecycle: Defense
    • Palo Alto Secure Business Systems Administration Module 5 Quiz

Related Courses

Network Security
(ISC)² via Coursera
5G Network Fundamentals
Institut Mines-Télécom via Coursera
5G for Everyone
Qualcomm via Coursera
AWS Advanced Networking Specialty (LA)
A Cloud Guru
AWS Certified Advanced Networking - Specialty 2020
A Cloud Guru