Menu
Menu
  • No products in the basket.

CompTIA Advanced Security Practitioner Training Course

0( 0 REVIEWS )
132 STUDENTS
ACCREDITED BY

Overview:

If you are looking to advance your IT career, CompTIA Advanced Security Practitioner is perfect for you. Become competent in CompTIA Advanced Security Practitioner and succeed in your employment. The course has a technical hands-on approach and covers areas of network security, system security, risk management, analysis and troubleshooting, information security and policies and procedures.

The course will provide you an overview of CompTIA Advanced Security Practitioner and cover the technical skills and knowledge required to create, design and engineer secure solutions across complex enterprises. Learners will be required to apply critical thinking and decision making skills across a range of security disciplines to implement solutions and manage risks.

The CompTIA Advanced Security Practitioner course will help learners become established professionals in the industry. Learners will gain an understanding of security policies, security design and solutions, managing risks in projects and also learn about disaster recovery and business continuity. The course is internationally recognised and accredited to a training organisation and you will be issued an internationally recognised qualification following full completion of CompTIA Advanced Security Practitioner.

Why consider 1Training?

As improvements and advancements are made in technology, online courses are no longer just conventional means of studying at affordable costs. In many aspects online training offers superiority to traditional learning. There is an effectiveness and convenience that traditional learning cannot provide. The overall convenience and flexibility makes it a superior learning method.

1Training offers the most convenient path to gain an internationally recognised qualification that will give you the opportunity to put into practice your skill and expertise in an enterprise or corporate environment. You can study at your own pace at 1Training and you will be provided with all the necessary material, tutorials, qualified course instructor and multiple free resources which include Free CV writing pack, TOTUM extra Discount Card, Free career support and course demo to make your learning experience enriching and more rewarding.

Learning Outcomes

  • Gain an understanding of operation and architecture concepts and techniques.
  • Analyse risk through interpreting data, anticipating cyber attacks and responding to them appropriately.
  • Learn how to expand security controls on small form devices.
  • Understand integrating cloud and virtualisation technologies.
  • Learn how to implement cryptographic technologies including Cryptocurrency.

Course Titles

  • Module 01: The Enterprise Security Architecture
  • Module 02: The Enterprise Security Technology
  • Module 03: Enterprise Resource Technology
  • Module 03: Enterprise Resource Technology
  • Module 05: Managing Risk in Projects
  • Module 06: Integrating Authentication and Authorization Techniques
  • Module 07: Implementing Cryptographic Techniques
  • Module 08: Integrating Hosts, Storage, Networks, and Applications
  • Module 09: Security Research and Analysis
  • Module 10: Disaster Recovery and Business Continuity
  • Module 11: Responding to and Recovering from Incidents
  • Module 12: Legal Issues
  • Module 13: Judgment and Decision-Making

Access Duration

The course will be directly delivered to you, and you have 12 months access to the online learning platform from the date you joined the course.  The course is self-paced and you can complete it in stages, revisiting the lectures at anytime.

Who is this Course aimed at?

The CompTIA Advanced Security Practitioner course is aimed at individuals who have hands-on, technical security experience of 5 years, and/or 10 years experience in IT administration.

Entry Requirements

  • You must be over the age of 16 and have a basic understanding of Maths, English and ICT
  • The course is for security professionals

Method of Assessment

This is a multiple choice, performance-based exam comprising of 90 questions to be completed in 165 minutes.

As it is an official exam, learners will have to purchase it separately on the relevant website.

Certification

Those who successfully complete the exam will be awarded the certificate in CompTIA Advanced Security Practitioner.

Awarding Body

The certificate will be awarded by CompTIA. This internationally recognised qualification will make your CV standout and encourage employers to see your motivation at expanding your skills and knowledge in the IT enterprise.

Progression and Career Path

Once you successfully complete CompTIA Advanced Security Practitioner you will be qualified to work in the following positions. The CompTIA Advanced Security Practitioner qualification will also put you in line to demand a higher salary or job promotion. The average UK salary per annum according to https://www.payscale.com is given below.

  • Cyber Security Analyst – £35,562 per annum
  • Information Security Analyst – £34,906 per annum
  • IT Specialist – £32,479 per annum
  • Security Architect – £59,290 per annum

Other Benefits

  • Written and designed by the industry’s finest expert instructors with over 15 years of experience
  • Repeat and rewind all your lectures and enjoy a personalised learning experience
  • Gain access to quality video tutorials
  • Unlimited 12 months access from anywhere, anytime
  • Save time and money on travel
  • Learn at your convenience and leisure
  • Quizzes, tests mock exams, practice exams to ensure you are 100% ready
  • The benefit of applying for TOTUM extra Discount Card.
  • Free Career Support Service
  • 25% Discount on personal Statement and covering letter writing service
  • Free Access to Over 150 courses for 2 days (48 hours)
  • Free access to course before you purchase (For selected courses only)

Key Features

Gain an accredited UK qualification

Access to excellent quality study materials

Learners will be eligible for TOTUM Discount Card

Personalized learning experience

One year’s access to the course

Support by phone, live chat, and email

Course Curriculum Total Units : 559
➤ Module 01 - The Enterprise Security Architecture
Course Introduction
1.0 Topic A: The Basics Of Enterprise Security
1.1 The Enterprise
1.2 Enterprise Security
1.3 Business Goals and Security
1.4 Common Enterprise Security Principles
1.5 Enterprise Threat Intelligence
1.6 What to Protect?
1.7 Defense in Depth
1.8 Common Components of an Enterprise Security Solutions
1.9 Policies, Standards, and Procedures
1.10 Enterprise Policy Types
2.0 Topic B: The Enterprise Structure
2.2 The Management Team
2.3 Network Administrator
2.4 The DBA
2.5 Programmers
2.6 Stakeholders
2.7 Finance
2.8 Human Resources
2.9 Physical Security and Facilities Roles
2.10 Discipline Collaboration
3.0 Topic C: Enterprise Security Requirements
3.1 Legal Compliance
3.2 PII
3.3 Privacy Requirements
3.4 Organizational Security Requirements
3.5 Lesson 01 Review
➤ Module 02 - The Enterprise Security Technology
1.0 Topic A: Common Network Security Components And Technologies
1.1 Common Enterprise Security Components
1.2 VoIP Integration
1.3 IPv6 Migration and Integration
1.4 VLAN Integration
1.5 DNS Security Techniques
1.6 Secure Directory Services
1.7 NIDS
1.8 NIPS
1.9 The NIPS Process
1.10 ESB
1.11 The ESB Process
1.12 DAM
2.0 Topic B: Communications And Collaboration Security
2.1 UC Security
2.2 UC Attacks
2.3 UC Components
2.4 Traffic Prioritization (QoS)
2.5 Security Solutions for Data Flow
2.6 VoIP Security
2.7 The VoIP Implementation Process
2.8 VoIP Implementation Considerations
2.9 Remote Access Security
2.10 VPN Solutions
2.11 External Communications Security
2.12 Collaboration Platform Security Issues
2.13 Demo – Least Privilege
2.14 Common Mobile Devices
2.15 Enterprise Security Methods for Mobile Devices
3.0 Topic C: Cryptographic Tools And Techniques
3.1 Cryptography in the Enterprise
3.2 Considerations for Cryptography in the Enterprise
3.3 Demo – File Encryption
3.4 Cryptographic Methods and Design
3.5 Basic Approaches to Encryption
3.6 Transport Encryption Methods
3.7 Security Implications for Encryption
3.8 Digital Signature Techniques
3.9 Advanced PKI Components
3.10 Code Signing
3.11 Attestation
3.12 Entropy
3.13 PRNG
3.14 PFS
3.15 Confusion and Diffusion
4.0 Topic D: Advanced Authentication
4.1 Advanced Authentication within the Enterprise
4.2 Certificate-Based Authentication
4.3 SAML
4.4 SPML
4.5 XACML
4.6 SOAP
4.7 WSS
4.8 Lesson 02 Review
➤ Module 03 - Enterprise Resource Technology
1.0 Topic A: Enterprise Storage Security Issues
1.1 Common Enterprise Storage Technologies
1.2 NAS Security Implications
1.3 SAN Security Implications
1.4 vSAN Security Implications
1.5 Virtual Storage
1.6 Security Implications of Virtual Storage
1.7 Cloud Storage
1.8 Security Implications of Cloud Stotage
1.9 Data Warehousing
1.10 Security Implications of Data Warehousing
1.11 Data Archiving
1.12 Security Implications of Data Archiving
1.13 iSCSI Security Implications
1.14 iSCSI
1.15 Security Implications of iSCSI
1.16 FCoE Security Implications
1.17 FCoE
1.18 Security Implications of FCoE
1.19 vSAN
1.20 Security Implications of vSAN
1.21 LUN
1.22 LUN Masking in the Security Architecture
1.23 Redundancy
1.24 Dynamic Disk Pools
1.25 LUN Masking and Mapping
1.26 HBA Allocations
1.27 Multipath
1.28 Offsite and Multisite Replication
1.29 Additional Storage Security Implications
1.30 Snapshots
1.31 Deduplication
1.32 Guidelines for Ensuring Secure Storage Management
2.0 Topic B: Distributed, Shared, And Virtualized Computing
2.1 Why Virtualization?
2.2 Advantages of Virtualization
2.3 VLANs
2.4 VMs
2.5 VDI
2.6 Terminal Services
2.7 Virtualization Vulnerabilities
2.8 Vulnerabilities of Hosting VMs for Multiple Companies
2.9 Virtual Environment Security Methods
3.0 Topic C: Cloud Computing And Security
3.1 Cloud Computing
3.2 Cloud Computing Service Models
3.3 Cloud Storage Considerations
3.4 Security Vulnerabilities of Cloud Computing
3.5 Secure Use of Cloud Computing Within the Enterprise
3.6 Lesson 03 Review
➤ Module 04 - Security Design And Solutions
1.0 Topic A: Network Security Design
1.1 Network Design Types and Techniques
1.2 Network Design Considerations
1.3 Data Network Types
1.4 A Data Network Topology
1.5 Data Network Topology Types
1.6 A Network Diagram
1.7 Data Network Media Types
1.8 Network Transmission Methodologies
1.9 Physical Security
1.10 Building Layout
1.11 Facilities Management
1.12 Unified Threat Management
1.13 NIDS
1.14 NIPS
1.15 Inline Network Encryptor
1.16 Security Information and Event Management
1.17 SIEM Capabilities
1.18 Network-Attached HSM
1.19 Application and Protocol Aware Technologies
1.20 Virtual Networking and Security Components
1.21 Device Placement
1.22 Guidelines for Analyzing Network Security Components and Devices
1.23 Guidelines for Analyzing Network Security Components and Devices (Cont.)
1.24 Building Automation Systems
1.25 Hardware Attacks
1.26 Environmental Threats and Vulnerabilities
1.27 Sensors
1.28 Physical Access Control Systems
1.29 Scientific and Industrial Equipment
1.30 A/V Systems
1.31 IP Video
1.32 Network Attacks
1.33 SCADA
1.34 Secure Infrastructure Design
1.35 Storage Integration Considerations
1.36 Guidelines for Analyzing Network-Enabled Devices
1.37 Remote Access
1.38 IPv6 and Associated Transitional Technologies
1.39 Network Authentication
1.40 802.1X
1.41 Software-Defined Networking
1.42 Cloud-Managed Networks
1.43 Guidelines for Analyzing Advanced Network Design
1.44 Network Baselining
1.45 Configuration Lockdown
1.46 Change Monitoring
1.47 Availability Controls
1.48 ACLs
1.49 DMZ
1.50 Separation of Critical Assets
1.51 Data Flow Enforcement
1.52 Network Device Configuration
1.53 Network Access Control
1.54 Critical Infrastructure and Industrial Control Systems
1.55 Network Management and Monitoring Tools
1.56 Guidelines for Configuring Controls for Network Security
2.0 Topic B: Conduct A Security Assessment
2.1 Malware Sandboxing
2.2 Memory Dumping
2.3 Runtime Debugging
2.4 Vulnerability Assessment
2.5 Penetration Testing
2.6 Hacking Steps
2.7 Penetration Testing Techniques
2.8 Fingerprinting
2.9 Types of Social Engineering
2.10 Vulnerability Scanners
2.11 Port Scanners
2.12 Protocol Analyzers
2.13 Network Enumerators
2.14 Password Crackers
2.15 Fuzzers
2.16 HTTP Interceptors
2.17 Exploitation Tools and Frameworks
2.18 Passive Reconaissance and Intelligence Gathering Tools
2.19 Code Review Methods
2.20 A Social Engineering Test
2.21 Security Assessment Tools
2.22 How to Conduct a Security Assessment
3.0 Topic C: Host Security
3.1 Host-Based Security Controls
3.2 Host-Based Firewalls
3.3 Firewall Rules
3.4 Demo – Firewalls
3.5 TPM
3.6 Trusted OS
3.7 Endpoint Security
3.8 Endpoint Security Software
3.9 Guidelines for Selecting Host Hardware and Software
3.10 Security and Group Policy Implementations
3.11 Standard Operating Environment
3.12 Command Shell Restrictions
3.13 Patch Management
3.14 Out-of-Band Communication
3.15 Peripheral Restrictions
3.16 Communications Protocols Used by Peripherals
3.17 Full Disk Encryption
3.18 Trusted OS (Cont.)
3.19 Endpoint Security (Cont.)
3.20 Anti-Malware Software
3.21 Host Hardening
3.22 Guidelines for Hardening Hosts
3.23 Operating System Security
3.24 Host Hardening Action Steps
3.25 Asset Management
3.26 HIDS
3.27 HIPS
3.28 Host Monitoring
3.29 Virtualization Platforms
3.30 Hypervisors
3.31 Container-Based Virtualization
3.32 VDI
3.33 Security Implications of VDI
3.34 Terminal Services
3.35 Application Delivery Services
3.36 vTPM
3.37 VM Vulnerabilities
3.38 Guidelines for Virtualizing Servers and Desktops
3.39 Cloud Services
3.40 Cloud Security Services
3.41 Hash Matching
3.42 Content Filtering
3.43 Guidelines for Implementing Cloud Augmented Security Services
3.44 BIOS
3.45 UEFI
3.46 Secure Boot
3.47 Measured Launch
3.48 IMA
3.49 Lesson 04 Review
➤ Module 05 - Managing Risk In Projects
1.0 Topic A: Create A Risk Management Plan
1.1 Risk
1.2 Risk Exposure
1.3 Risk Analysis Methods
1.4 Risks Facing an Enterprise
1.5 Project Buffer
1.6 Classification of Risks
1.7 Business Risk vs. Insurable Risk
1.8 Risk Tolerance
1.9 Probability Scale
1.10 Impact Scale
1.11 RBS
1.12 Enterprise Security Architecture Frameworks
1.13 ESA Framework Assessment Process
1.14 New Products and Technologies
1.15 New and Changing Business Models
1.16 Partnership Model
1.17 Outsourcing Model
1.18 Cloud Model
1.19 Mergers
1.20 Demergers and Divestitures
1.21 Integration of Diverse Industries
1.22 Third-Party Providers
1.23 Internal and External Influences
1.24 De-parameterization
1.25 Risk Determinations
1.26 Guidelines for Assessing Risk
1.27 Classes of Information
1.28 Classification of Information Types into CIA Levels
1.29 Stakeholder Input for CIA Decisions
1.30 Technical Controls
1.31 Aggregate CIA Score
1.32 Extreme Scenario Planning and Worst-Case Scenarios
1.33 System-Specific Risk Analysis
1.34 Risk Response Techniques
1.35 Risk Management Processes
1.36 Continuous Monitoring and Improvement
1.37 Risk Management
1.38 The Risk Management Plan
1.39 Components of a Risk Management Plan
1.40 How to Create a Risk Management Plan
1.41 IT Governance
1.42 Guidelines for Mitigating Risk
1.43 Policy Development
1.44 Process and Procedure Development
1.45 Best Practices to Incorporate in Security Policies and Procedures
1.46 Legal Compliance and Advocacy
1.47 General Privacy Principles
2.0 Topic B: Identify Risks And Their Causes
2.1 Triggers
2.2 Information Gathering Techniques
2.3 Documentation Reviews
2.4 SWOT Analysis
2.5 Risk Analysis
2.6 Risk Register
2.7 Components of a Risk Register
2.8 Risk Categories
2.9 How to Identify Risks and Their Causes
3.0 Topic C: Analyze Risks
3.1 Qualitative Risk Analysis
3.2 Quantitative Risk Analysis
3.3 Risk Probability and Impact Assessment
3.4 The Probability and Impact Risk Rating Matrix
3.5 The Ongoing Risk Assessment Process
3.6 Project Risk Ranking
3.7 Data Collection and Representation Techniques
3.8 Basics of Probability
3.9 Probability Distribution
3.10 Quantitative Analysis Methods
3.11 Qualitative Analysis Methods
3.12 Risk Data Quality Assessment
3.13 Risk Urgency Assessment
3.14 Simulation
3.15 Monte Carlo Analysis
3.16 How to Analyze Risks
4.0 Topic D: Develop A Risk Response Plan
4.1 Negative Risks
4.2 Negative Risk Strategies
4.3 Positive Risks
4.4 Positive Risk Strategies
4.5 Contingency Plan
4.6 The BCP
4.7 DRP
4.8 Contingency Reserve
4.9 Risk-Related Contract Decisions
4.10 How to Develop a Risk Response Plan
4.11 Lesson 05 Review
➤ Module 06 - Integrating Authentication And Authorization Techniques
1.0 Topic A: Implement Authentication And Authorization Technologies
1.1 Authentication
1.2 Certificate-Based Authentication
1.3 SSO
1.4 Authorization
1.5 OAuth
1.6 The OAuth Process
1.7 XACML
1.8 SPML
1.9 Trust Models
1.10 RADIUS Configurations
1.11 LDAP
1.12 Active Directory
1.13 Kerberos
1.14 Guidelines for Implementing Authentication and Authorization
2.0 Topic B: Implement Advanced Identity Management
2.1 Attestation
2.2 Identity Propagation
2.3 Identity Federation
2.4 Identity Federation Methods
2.5 Guidelines for Implementing Advanced Identity Management
2.6 Lesson 06 Review
➤ Module 07 - Implementing Cryptographic Techniques
1.0 Topic A: Describe Cryptographic Concepts
1.1 Confidentiality
1.2 Integrity
1.3 Non-repudiation
1.4 Entropy
1.5 Confusion
1.6 Diffusion
1.7 Chain of Trust
1.8 Root of Trust
1.9 Steganography
1.10 Advanced PKI Concepts
2.0 Topic B: Choose Cryptographic Techniques
2.1 Cryptographic Applications
2.2 Cryptographic Methods
2.3 Block Cipher Modes
2.4 Cryptographic Design Considerations
2.5 Transport Encryption
2.6 Transport Encryption Protocols
2.7 Data at Rest Encryption
2.8 Hashing
2.9 Hash Functions
2.10 Key Stretching
2.11 Digital Signatures
2.12 Code Signing
2.13 Pseudorandom Number Generation
2.14 Perfect Forward Secrecy
2.15 Guidelines for Choosing Cryptographic Techniques
3.0 Topic C: Choose Cryptographic Implementations
3.1 DRM
3.2 Digital Watermarking
3.3 SSL/TLS
3.4 SSH
3.5 PGP and GPG
3.6 S/MIME
3.7 Guidelines for Choosing Cryptographic Implementations
3.8 Lesson 07 Review
➤ Lesson 08 - Integrating Hosts, Storage, Networks, And Applications
1.0 Topic A: Implement Security Standards In The Enterprise
1.1 Standards
1.2 Categories of Standards
1.3 Interoperability Issues
1.4 Data Flow Security
1.5 Guidelines for Implementing Standards in the Enterprise
2.0 Topic B: Select Technical Deployment Models
2.1 Deployment Models
2.2 Cloud and Virtualization and Hosting Options
2.3 Elastic Cloud Computing
2.4 Data Remnants in the Cloud
2.5 Data Aggregation
2.6 Data Isolation
2.7 Resource Provisioning and De-provisioning
2.8 Virtual Machine Vulnerabilities
2.9 Virtual Environment Security
2.10 Virtual Environment Security (Cont.)
2.11 Network Segmentation
2.12 Network Delegation
2.13 Mergers and Acquisitions
2.14 Guidelines for Selecting Technical Deployment Models
3.0 Topic C: Secure The Design Of The Enterprise Infrastructure
3.1 Infrastructure Design Security
3.2 Deployment Diagrams
3.3 Storage Integration
3.4 Guidelines for Securing the Design of the Enterprise Infrastructure
4.0 Topic D: Secure Enterprise Application Integration Enablers
4.1 Customer Relationship Management
4.2 Enterprise Resource Planning
4.3 Governance, Risk, and Compliance
4.4 Enterprise Service Bus
4.5 Service Oriented Architecture
4.6 Directory Services
4.7 Domain Name System
4.8 Configuration Management Database
4.9 Content Management System
4.10 Guidelines for Securing Enterprise Application Integration Enablers
4.11 Lesson 08 Review
➤ Lesson 09 - Security Research And Analysis
1.0 Topic A: Perform An Industry Trends And Impact Analysis
1.1 Industry Best Practices
1.2 Demo – Security Research
1.3 Research Methods
1.4 Technology Evolution
1.5 New Technologies, Security Systems, and Services
1.6 New Security Technology Types
1.7 Global IA Industry and Community
1.8 Security Requirements for Contracts
1.9 Guidelines for Determining Industry Trends and Effects on the Enterprise
1.10 Situational Awareness
1.11 Situational Awareness Considerations
1.12 Emerging Business Tools
1.13 Social Media as an Emerging Business Tool
1.14 Mobile Devices as Emerging Business Tools
1.15 Emerging Security Issues
1.16 The Global Impact Analysis Industry
1.17 Security Requirements for Business Contracts
1.18 How to Perform an Industry Trends Impact Analysis
2.0 Topic B: Perform An Enterprise Security Analysis
2.1 Benchmarking
2.2 Network Traffic Analysis
2.3 Types of Network Traffic Analysis
2.4 Prototyping and Testing
2.5 Cost-Benefit Analysis
2.6 Security Analysis Strategies
2.7 Security Solution Analysis
2.8 Lessons Learned Review
2.9 How to Perform an Enterprise Security Analysis
2.10 Review Existing Security
2.11 Reverse Engineering
2.12 Solution Attributes
2.13 After-Action Report
2.14 Guidelines for Analyzing Scenarios to Secure the Enterprise
2.15 Lesson 09 Review
➤ Lesson 10 - Disaster Recovery And Business Continuity
1.0 Topic A: Bcp Fundamentals
1.1 BCPs
1.2 BCP Development Phases
1.3 NIST Contingency Planning Steps
1.4 NFPA Business Planning Framework
1.5 Disruptive Events
1.6 BIA
1.7 BIA Organizational Goals
1.8 BIA Process
1.9 Critical Business Process
1.10 Vulnerability Assessments
1.11 MTD
1.12 RPO
1.13 RTO
1.14 RPO/RTO Optimization
2.0 Topic B: Bcp Implementation
2.1 Program Coordinators
2.2 Advisory Committee-BCP Team
2.3 BCP Team Responsibilities
2.4 BCP Contents
2.5 Business Plan Evaluations
2.6 Business Plan Testing
2.7 Business Plan Maintenance
2.8 Business Continuity Process
3.0 Topic C: Drp Fundamentals
3.1 DRP
3.2 Disaster Recovery Strategy
3.3 Disaster Recovery Priority Levels
3.4 Disaster Recovery Response Approaches
3.5 Backup Strategies
3.6 Data Restoration Strategies
3.7 Alternate Sites
4.0 Topic D: Drp Implementation
4.1 Recovery Team
4.2 Salvage Team
4.3 Disaster Recovery Evaluation and Maintenance
4.4 Disaster Recovery Testing
4.5 Disaster Recovery Process
4.6 Lesson 10 Review
Review Quiz
➤ Lesson 11 - Responding To And Recovering From Incidents
1.0 Topic A: Design Systems To Facilitate Incident Response
1.1 Internal and External Violations
1.2 Security Violations and System Design
1.3 System, Audit, and Security Logs
1.4 Guidelines for Designing Systems to Facilitate Incident Response
2.0 Topic B: Conduct Incident And Emergency Responses
2.1 E-Discovery
2.2 E-Discovery Policy
2.3 Data Breach
2.4 Data Breach Response
2.5 Chain of Custody
2.6 Forensic Analysis of Compromised Systems
2.7 COOP- Continuity of Operations
2.8 Order of Volatility
2.9 Guidelines for Conducting Incident and Emergency Responses
2.10 Lesson 11 Review
Review Quiz
➤ Lesson 12 - Legal Issues
1.0 Topic A: Computer Crime Laws And Regulations
1.1 Common Law
1.2 Statutory Law
1.3 Types of Statutory Offenses
1.4 Administrative Law
1.5 Intellectual Property Law
1.6 Information Privacy Law
1.7 Computer Crime Law
1.8 Compliance
1.9 Liability
1.10 Internal and External Audits
1.11 Governmental Oversight Resources
2.0 Topic B: Computer Crime Incident Response
2.1 Computer Crime
2.2 The Computer Criminal Incident Response Process
2.3 The Evidence Life Cycle
2.4 Evidence Collection Techniques
2.5 Evidence Types
2.6 Chain of Evidence
2.7 Rules of Evidence
2.8 Surveillance Techniques
2.9 Search and Seizure
2.10 Computer Forensics
2.11 Lesson 12 Review
➤ Lesson 13 - Judgment And Decision-making
1.0 Topic A: Develop Critical Thinking Skills
1.1 Intellectual Autonomy
1.2 Humility
1.3 Objectivity
1.4 Focus on the Argument
1.5 Clarity
1.6 Defining Your Argument
1.7 Intellectual Honesty
1.8 Logical Fallacies
1.9 Assessing Arguments Logically
1.10 How to Employ Critical Thinking Skills
2.0 Topic B: Determine The Root Of A Problem
2.1 Obstacles to Analysis
2.2 Occam’s Razor
2.3 Techniques for Applying Occam’s Razor
2.4 Theme Analysis
2.5 The Four Guidelines Technique
2.6 How to Determine the Root of a Problem
3.0 Topic C: Use Judgment To Make Sound Decisions
3.1 Analyzing Problems
3.2 Analytical vs. Creative Thinking
3.3 Barriers to Creative Thinking
3.4 Brainstorming
3.5 Rules of Brainstorming
3.6 Evaluating Brainstorming Ideas
3.7 A Fishbone Diagram
3.8 A Pareto Chart
3.9 A Histogram
3.10 A Cost-Benefit Analysis
3.11 Phases in Cost-Benefit Analysis
3.12 A Prioritization Matrix
3.13 A Trade-Off Method
3.14 A Decision Tree
3.15 An Ease and Effect Matrix
3.16 A PMI Analysis Table
3.17 How to Use Judgment to Make Sound Decisions
3.18 Lesson 13 Review
3.19 Course Closure
WhatsApp chat
Offer Extended – Up to 95% OFF !!
Use code SAVE95 | SAVE90 or SAVE80 at checkout
x