Network Security Essentials Defense-in-Depth Vulnerability Management and Response Data Security Technologies Windows Security Linux, Mac and Smartphone Security
Fundamentals of Traffic Analysis: Part I Fundamentals of Traffic Analysis: Part II Signature Based Detection Anomalies and Behaviors Modern and Future Monitoring: Forensics, Analytics, and Machine Learning IDS Capstone Challenge SIEM Architecture Service Profiling with SIEM Advanced Endpoint Analytics Baselining and User Behavior Monitoring Tactical SIEM Detection and Post-Mortem Analysis Capstone: Design, Detect, Defend
ویژه : مدیران ارشد فناوری اطلاعات ، مدیران امنیت اطلاعات و شبکه ، کارشناسان امنیت و عملیات ، دانشجویان رشته های مرتبط