This course is designed for individuals interested in security operations and access management within IT environments. It is suitable for entry-level cybersecurity professionals, IT support staff, and those looking to develop skills in identity and access control as part of broader security operations functions.
Participants will develop the ability to manage and support access control systems and security operations processes. The course focuses on practical skills in identity and access management, authentication and authorization mechanisms, and monitoring activities that help protect organizational assets and ensure appropriate access to systems.
| Security Operations Fundamentals |
| Log Management Basics |
| Network Traffic Capture |
| Wireshark Fundamentals |
| Wireshark Analysis |
| Advanced Security Monitoring |
| Network Protection and Encryption |
| Advanced Network Security Implementation |
Accredited by:
