Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Cybrary

Palo Alto Networks Secure Business Systems: Administration

via Cybrary

Overview

Cyber Crime is becoming more prevalent today and businesses need to protect their systems by adopting a preventive and defensive posture. It is extremely important to understand the fundamental components of cybersecurity in order to reduce the business attack surface and minimize overall risk. This course is designed to introduce students to the cybersecurity landscape and challenges associated with protecting critical business systems.

Course Domains:

Cyber Threat Identification Business Cyber Crimes and Challenges Business Security Policy Cyber-Attack Life-Cycle

Upon completion of the course, students will be able to:

  • Identify common cyber threats and attacks
  • Understand the organization's core business/mission processes
  • Develop security policies for applications that interface with one another, such as Business-to-Business(B2B) applications.
  • Prioritize critical business functions with organizational stakeholders.

Syllabus

  • Introduction
    • Course Introduction
    • Secure Business Systems Administration Overview
    • Cybersecurity: Why it Matters
  • Cyber Threat Identification
    • Climate and Landscape
    • Malware Definition and Classification
    • Vulnerabilities and Exploits
    • Bots and Botnets
    • Cyber Threats and Attacks
    • Major Threat Actors
    • Cyber Attack Techniques and Types
    • Wifi and Advanced Persistent Threats
    • Palo Alto Secure Business Systems Administration Module 2 Quiz
  • Cyber Crimes and Challenges
    • Employee Cybersecurity Challenges
    • Notable Business Cyber Crimes
    • High Profile Attacks
    • Cyber-Attack Lifecycle
    • Palo Alto Secure Business Systems Administration Module 3 Quiz
  • Business Security Policy
    • Business Security Policy Overview and Planning
    • Acceptable Use and Password Policies
    • Policy Enforcement and Incident Response
    • Compliance Challenges
    • Palo Alto Secure Business Systems Administration Module 4 Quiz
  • Restoration
    • Mitigation
    • Restoration
    • Cyber-Attack Lifecycle: Attack
    • Cyber-Attack Lifecycle: Defense
    • Palo Alto Secure Business Systems Administration Module 5 Quiz

Reviews

Start your review of Palo Alto Networks Secure Business Systems: Administration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.