{"product_id":"security-training-analyst-to-architect-4-tracks-live-mentoring-labs-practice-tests-365-days","title":"SECURITY – From Security Analyst To Security Architect","description":"\u003cp data-mce-fragment=\"1\"\u003eWith new security threats appearing daily, security is a very important part of any organization. In this learning journey, you will explore different security roles that play a big role in keeping organizations secure.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eAnalyze, identify, mitigate, and prevent the theft of valuable data.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eThis learning path, with more than 68 hours of online content, is divided into the following four tracks:\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Analyst Track 1: Security Analyst\u003c\/strong\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Architect Track 2: Forensics Analyst\u003c\/strong\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Architect Track 3: Vulnerability Analyst\u003c\/strong\u003e\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Architect Track 4: Security Architect\u003c\/strong\u003e\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Analyst Track 1: Security Analyst\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eIn this Skillsoft Aspire track of the Security Architect journey, the focus will be on cybersecurity fundamentals, system security, and information security.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eContent:\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eE-learning courses\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eAn Executive's Guide to Security: Protecting Your Information \u0026amp; Understanding Security Threats\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCybersecurity 101: Auditing \u0026amp; Incident Response\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCybersecurity 101: Session \u0026amp; Risk Management\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: APT Defenses\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: NACs \u0026amp; Gateways\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: Subnetting \u0026amp; DNS for Security Architects\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: Securing Networking Protocols\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: Hardened Security Topologies\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: Continual Infrastructure Testing\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: Security Governance\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: Honeypots\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eInformation Security: Pen Testing\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eOnline Mentor\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eYou can reach your Mentor 24\/7 by entering chats or submitting an email.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eFinal Exam assessment\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEstimated duration: 90 minutes\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003ePractice Labs: Security Analyst \u003c\/strong\u003e(estimated duration: 8 hours)\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003ePractice Security Analysts tasks such as using file hashing, file encryption, Wireshark and performing code reviews. Then, test your skills by answering assessment questions after installing and configuring LXD, using group policy, configuring a honeypot and exploring the Metasploit framework. This lab provides access to tools typically used by Security Analysts, including:\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eKali Linux, Windows 10 and Windows Server 2019, PowerShell 5.1, Wireshark, Visual Studio Code\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Architect Track 2: Forensics Analyst\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eIn this Skillsoft Aspire track of the Security Architect journey, the focus will be on end-user awareness, anomaly detection, digital forensics, digital ethics \u0026amp; privacy, risk analysis, software assessment \u0026amp; audits, and cryptography.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eContent:\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eE-learning courses\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEnd-User Security: The End-User Perspective\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEnd-User Security: The Security Administrator Perspective\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEnd-User Security: Securing End Users against Attackers\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eAnomaly Detection: Aspects of Anomaly Detection\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eAnomaly Detection: Network Anomaly Detection\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eDigital Forensic Techniques \u0026amp; Investigative Approaches\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEthics \u0026amp; Privacy: Digital Forensics\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eRisk Analysis: Security Risk Management\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCryptography: Introduction to Cryptography Services\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eCryptography: Introduction to PKI\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003e\u003c\/strong\u003e\u003cstrong data-mce-fragment=\"1\"\u003eOnline Mentor\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eYou can reach your Mentor 24\/7 by entering chats or submitting an email.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eFinal Exam assessment\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEstimated duration: 90 minutes\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003ePractice Labs: Forensics Analyst \u003c\/strong\u003e(estimated duration: 8 hours)\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003ePractice Forensics Analyst tasks such as implementing web browser best practices, preventing brute force attacks, installing SIFT and detecting and removing keylogger software. Then, test your skills by answering assessment questions after auditing network security, applying Caesar cipher encryption techniques, implementing secure coding techniques and symmetric encryption.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Architect Track 3: Vulnerability Analyst\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eIn this Skillsoft Aspire track of the Security Architect journey, the focus will be on vulnerability management, IDS\/IPS, authentication, secure coding, tracking incidents, developing security topologies, and security architectures.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eContent:\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eE-learning courses\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSecurity Vulnerabilities: Managing Threats \u0026amp; Vulnerabilities\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIntrusion Detection: Best Practices\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIntrusion Prevention: Best Practices\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eAuthentication \u0026amp; Encryption: Best Practices\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSecurity Topologies: Developing Secure Networks\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSecurity Architect: Secure Coding Concepts\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSecurity Architectures: Defensible Security\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eOnline Mentor\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eYou can reach your Mentor 24\/7 by entering chats or submitting an email.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eFinal Exam assessment\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEstimated duration: 90 minutes\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003ePractice Labs: Vulnerability Analyst \u003c\/strong\u003e(estimated duration: 8 hours)\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003ePractice Vulnerability Analyst tasks such as performing local network scans, configuring Snort IDS, configuring and implementing intrusion detection, as well as configuring remote access with Secure Shell. Then, test your skills by answering assessment questions after cleaning input data, managing incidents, and configuring secure HTTPS and VPN services.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eSecurity Architect Track 4: Security Architect\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eIn this Skillsoft Aspire track of the Security Architect journey, the focus will be on rules of engagement, ethical hacking, intelligent security orchestration, regulatory mandates, breach notification process, triage automation, and unified security playbook.\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003eContent:\u003c\/p\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eE-learning courses \u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSecurity Rules: Rules of Engagement\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSecurity Architect: Ethical Hacking Best Practices\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eIntelligent Orchestration: Automating Security Incident Processing\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eRegulatory Mandates: Security Program Regulatory Integration\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eData Security Breach Notification Process\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eSecurity Incident Triage\u003c\/li\u003e\n\u003cli data-mce-fragment=\"1\"\u003eUnified Security: Playbook Approach to Security\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eOnline Mentor\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eYou can reach your Mentor 24\/7 by entering chats or submitting an email.\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003eFinal Exam assessment\u003c\/strong\u003e\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003eEstimated duration: 90 minutes\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp data-mce-fragment=\"1\"\u003e\u003cstrong data-mce-fragment=\"1\"\u003ePractice Labs: Security Architect \u003c\/strong\u003e(estimated duration: 8 hours)\u003c\/p\u003e\n\u003cul data-mce-fragment=\"1\"\u003e\n\u003cli data-mce-fragment=\"1\"\u003ePractice Security Architect tasks such as implementing testing best practices, executing Ansible playbooks, automating upgrades with playbooks, and analyzing SSH activity. Then, test your skills by answering assessment questions after examining security data breach categories, applying NIST standards on encryption, working with ethical hacking tools and applying mitigation tools and techniques.\u003c\/li\u003e\n\u003c\/ul\u003e","brand":"DiviTrain.com","offers":[{"title":"Default Title","offer_id":39259685552214,"sku":"","price":1099.0,"currency_code":"USD","in_stock":true}],"thumbnail_url":"\/\/cdn.shopify.com\/s\/files\/1\/0280\/0350\/0118\/files\/25.png?v=1743543961","url":"https:\/\/www.divitrain.com\/nl\/products\/security-training-analyst-to-architect-4-tracks-live-mentoring-labs-practice-tests-365-days","provider":"DiviTrain.com","version":"1.0","type":"link"}