Cyber-Threat Intelligence – In this course, learners will understand network defensive tactics, define network access control and use network monitoring tools. You will understand data protection risks and explore mobile endpoint protection, various scanning technologies, application security. This course also enables participants to learn current mechanisms used to continuously analyze millions of metrics across various data sources such as user activities, configurations, network traffic, and logs for malicious or anomalous activities.
This certificate course includes hands-on labs for each topic. You’ll need to successfully finish the labs for each topic before you proceed to the next topic.
Earn a Certificate
When you finish the course and complete the hands-on labs for each topic, you’ll earn a certificate that you can share with prospective employers and your professional network.