Resultados 1 al 1 de 1

Tema: Coursera - Palo Alto Networks Cybersecurity Specialization by Palo Alto

Ver modo hilado

Mensaje anterior Mensaje anterior   Próximo mensaje Próximo mensaje
  1. #1
    Fecha de ingreso
    abril 2015
    Mensajes
    12.376
    Agradecido: 592

    Predeterminado Coursera - Palo Alto Networks Cybersecurity Specialization by Palo Alto

    be7343cdfb324867ea4ec6f42f3fccd2 - Coursera - Palo Alto Networks Cybersecurity Specialization by Palo  Alto

    Coursera - Palo Alto Networks Cybersecurity Specialization by Palo Alto
    Video: .mp4 (1280x720) | Audio: AAC, 44100 kHz, 2ch | Size: 2.50 Gb | Materials: PDF
    Genre: eLearning Video | Duration: 9h 31m | Language: English
    Palo Alto Networks Cybersecurity Specialization. Gain cybersecurity workforce entry level skills while implementing the Next Generation Firewall.

    Palo Alto Networks Academy Cybersecurity Foundation
    In this course, students will learn the fundamentals of cybersecurity and identify the concepts required to recognize and potentially mitigate attacks against enterprise networks as well as mission critical infrastructure. Course 1 of 5 in the Palo Alto Networks Security Operating Platform Cybersecurity Specialization. Course Structure - 7 Modules Each module has the following components: Reading, e-learning, Discussion, and Assessment. E-learning components either direct students to online resources or deliver audio transcriptions of the module reading component. Assessments are quizzes that are designed as learning activities, and allow students two attempts for each quiz. At the end of the course there is a hands-on lab activity. Supporting Materials The CyberSecurity Survival Guide is a downloadable pdf file that presents information included in both the Foundation and Gateway classes as well as glossary 'key' terms and figures. The Foundation course maps to Chapter 1 of the Survival Guide.

    PaloAlto Networks Gateway 1
    Gateway 1 Course Description: Gateway Part I provides the student with a partial understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course, students will be able to partially examine and describe general networking fundamentals, and also implement basic networking configuration techniques. Why Should You Take This Course: Gateway 1 Course Objectives: Upon completion of this course, students will be able to: * Demonstrate knowledge of interconnected technology in daily communication and understanding systems that need protection. * Demonstrated knowledge of physical, logical, and virtual addressing that accommodates various sized networks through the use of subnet mask schemes. * Explain the TCP/IP Model and correctly identify the functions of the specific layers including packet encapsulation and lifecycle.

    Cybersecurity Gateway II
    Gateway II Course Description Gateway II provides the student with a full understanding of the fundamental tenants of networking and covers the general concepts involved in maintaining a secure network computing environment. Upon successful completion of this course, students will be able to fully examine, describe general networking fundamentals and implement basic networking configuration techniques. Gateway II Learning Objectives: Upon completion of this course, students will be able to: * Examine cybersecurity landscape environments, attack threat vectors, exposure, vulnerabilities, and risk factors. * Accurately explain common use of cloud, virtualization, storage, backup, and recovery procedures. * Apply the knowledge and skills necessary to plan, design, implement, troubleshoot, and maintain network infrastructure environments.

    Palo Alto Networks Cybersecurity Essentials I
    Course Description: Essentials I provides the student with a partial understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will partially learn the nature and scope of today's cybersecurity challenges, strategies for network defense, as well as detailed information about next-generation cybersecurity solutions. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment. Learning Objectives: Upon completion of this course, students will be able to: * Formulate an industry-standard design to protect infrastructure against cybersecurity threats. * Apply advanced filtering methodologies such as user, application, and content ID to protect against all known and unknown attack vectors. * Describe the basics of cryptography including synchronous/asynchronous encryption, PKI, and certificates.

    Palo Alto Networks Cybersecurity Essentials II
    Course Description: Essentials II provides the student with a full understanding of the fundamental tenants of cybersecurity and covers the general security concepts involved in maintaining a secure network computing environment. Students will fully learn the nature and scope of today's cybersecurity challenges, strategies for network defense, as well as detailed information about next-generation cybersecurity solutions. Students will also deploy a variety of security methodologies as well as technologies and concepts used for implementing a secure network environment. Learning Objectives: Upon completion of this course, students will be able to: * Demonstrate ability to assess and harden endpoints based on security policies. * Describe uses of advanced malware research and analysis to provide enhanced protection for enterprise networks. * Examine mobile and cloud-based connection technologies.

    Download link:
    Contenido oculto. Ha de estar registrado, y pulsar el botón "Gracias" para visualizar sus enlaces de descarga.
    Si trás registrarse todavía no visualiza el botón de "gracias", pulse la tecla F5, para refrescar la página.

  2. El siguiente Usuario agradeció a oaxino este mensaje:

    sergeorge (26 mayo 2022)

Etiquetas para este tema

Permisos de publicación