

Endpoint Security Professional
- Offered byEC-Council
Endpoint Security Professional at EC-Council Overview
Duration | 35 hours |
Total fee | ₹16,529 |
Mode of learning | Online |
Official Website | Go to Website |
Credential | Certificate |
Endpoint Security Professional at EC-Council Highlights
- Earn a certificate after completion of the course
- Quizzes & Assessments for practice
Endpoint Security Professional at EC-Council Course details
- This learning path is for professionals planning to make a career in the field of endpoint security.
- Learn about networking concepts, network files and commands
- Learn network security from scratch including different kind of attacks and monitoring tools
- Manage an enterprise security incident by effectively prioritizing the response
- Learn the fundamentals of Identity and Access Management
- Explore different approaches for implementing IAM
- Learn to use Cisco technologies and solutions to design and build an enterprise network
- Implementing Threat Defense Technologies
- Configuring various IP Services technologies and protocols
- Learn about the frameworks and industry standards for hunting
- Master how to extract, ingest, visualize, and analyze basic logs and events
- This course equips participants with the knowledge and skills needed to design, implement, and manage effective endpoint security strategies
- In this course students will be well-equipped to address the complex challenges associated with securing endpoints in diverse organizational settings
Endpoint Security Professional at EC-Council Curriculum
IT Linux Network Administration
Lab Setup
Linux Network Administration
Hands-on Network Security
Introduction to Network Security
Routers and Firewalls
Planning and Implementing a Security Incident Response
What is Threat Modelling?
Building a Computer Security Incident Response Team (CSIRT)
Security Incident Report
Identity and Access Management
Identity Access Management Concepts
Governance
Key Identity and Access Management Concepts
Implementing and Administering Cisco Solutions: CCNA 200-301
Network Fundamentals
Network Access
IP Connectivity
Applied Threat Hunting
Introduction to Threat Hunting
Hunting TTPs
Hunting Logs and Events
Securing Endpoints with Microsoft Defender
Introduction to Microsoft Defender for Endpoint
Specifying the Components of Microsoft Defender for Endpoint
Learn About Deployment of Microsoft Defender for Endpoint Solution to Organization