- Setup Google Meets
- How to create backgrounds
- How to create activities
- Understanding of Splunk's interface
- Use basic search
- Using fields in search
- Better understand SonicWall Management options
- Set up High Availability
- Perform Firmware upgrades
- Integrate FortiManager, FortiAnalyzer, and multiple FortiGate devices using the Fortinet Security Fabric
- Centralize the management and monitoring of network security events
- Optimize FortiGate resources
- Access security files, file systems, and networks
- Execute shell scripting and automation techniques
- Manage storage devices, logical volumes, and file systems
- Define, implement, manage and maintain an information security governance program that includes leadership, organizational structures, and processes
- Create risk assessment schedule and check lists
- Create risk reporting metrics and processes
- Perform evidence searching, seizing and acquisition methodologies in a legal and forensically sound manner
- Better understand steganography and its techniques
- Gather volatile and non-volatile information from Windows
- Set up a cloud solution environment
- Plan and configure a cloud solution
- Deploy and implement a cloud solution
- Understand the core concepts and structure of NIST CSF 2.0
- Integrate the CSF with other frameworks and standards
- Implement effective cybersecurity governance
- Designing of your security
- Effective security mechanisms
- Properly setting up your device to securely connect to your wireless network
- Purpose of a project charter
- Different Agile and Agile Hybrid Frameworks
- Project process groups
- Make effective cloud models
- Cloud Security
- Resource Management