- Configuration Management
- Data Security
- Logical Access
- Network Monitoring
- Penetration Testing
- Vulnerability Management
Learn about configuration standards from industry leaders such as the Center for Internet Security, NIST, SANS, AWS, and Microsoft.
Learn about practices to safeguard data using encryption, transport layer security, and effective key management during transmission, processing, and storage.
Learn about identity and access management to protect assets against unauthorized use.
Learn about the tools and techniques to monitor the performance and security of your environment.
Learn how to evaluate the security of your systems and identify vulnerabilities through ethical hacking.
Learn about protecting your critical assets with a comprehensive program to defend against malicious threats.