![]() ![]() Explore how to secure the enterprise with NGFW and Traps endpoint protection.Review capabilities of the Security Operating Platform and components.Create and test an authentication policy on a next generation firewall.Setup and configure inside, outside and DMZ security zones on a NGFW.Review perimeter network security strategies, policies, models, and trust.Explore Zero Trust design principles, architecture, capabilities, and.Describe how bots and botnets are used to attack enterprise networks.Configure and test a malware analysis security profile.Identify malware types, vulnerabilities, exploits, spamming and phishing attacks.Recognize high-profile cybersecurity attacks and Advanced Persistent Threats. ![]() ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |