Live Online Style Video +Live Instructor + Official Course-Book + Hands-on Labs

Includes:

  1. Power Packed 16 Hours (Edited from 40 hours of Live Training)
  2. 6 months access to videos.
  3. Access via Laptop, Tab, Mobile, and Smart TV.
  4. Certificate of Completion.
  5. Official Course-Book
  6. 120+ Tests Questions (Qubits42)
You can also purchase an annual plan for USD 999. For one year, all Flexi Videos will be free for you. Buy Annual Plan

You will get access to Flexi Video within 30 minutes.

Flexi Video

USD 199

Official Course-Book1

USD 39

Hands-On-Labs

NA

1Delivery lead time is 1 Day

Total

USD 199

100% Refund for Flexi Video (Course-Book is non-refundable) if user is not satisfied with the Video and seeks refund within 30 days of purchase.

Download Course Contents
Domain 1: Attacks, Threats, and Vulnerabilities
  • Compare and contrast different types of social engineering techniques.
  • Given a scenario, analyze potential indicators to determine the type of attack.
  • Given a scenario, analyze potential indicators associated with application attacks.
  • Given a scenario, analyze potential indicators associated with network attacks.
  • Explain different threat actors, vectors, and intelligence sources.
  • Explain the security concerns associated with various types of vulnerabilities.
  • Summarize the techniques used in security assessments.
  • Explain the techniques used in penetration testing.
  • Explain the importance of security concepts in an enterprise environment.
  • Summarize virtualization and cloud computing concepts.
  • Summarize secure application development, deployment, and automation concepts.
  • Summarize authentication and authorization design concepts.
  • Given a scenario, implement cybersecurity resilience.
  • Explain the security implications of embedded and specialized systems.
  • Explain the importance of physical security controls.
  • Summarize the basics of cryptographic concepts.
  • Given a scenario, implement secure protocols.
  • Given a scenario, implement host or application security solutions
  • Given a scenario, implement secure network designs.
  • Given a scenario, install and configure wireless security settings.
  • Given a scenario, implement secure mobile solutions.
  • Given a scenario, apply cybersecurity solutions to the cloud.
  • Given a scenario, implement identity and account management controls.
  • Given a scenario, implement authentication and authorization solutions.
  • Given a scenario, implement public key infrastructure.
  • Given a scenario, use the appropriate tool to assess organizational security.
  • Summarize the importance of policies, processes, and procedures for incident response.
  • Given an incident, utilize appropriate data sources to support an investigation.
  • Given an incident, apply mitigation techniques or controls to secure an environment.
  • Explain the key aspects of digital forensics.
  • Compare and contrast various types of controls.
  • Explain the importance of applicable regulations, standards, or frameworks that impact organizational security posture.
  • Explain the importance of policies to organizational security
  • Summarize risk management processes and concepts.
  • Explain privacy and sensitive data concepts in relation to security

Learn more about Koenig. Download Presentation Buy Other Flexi

FAQ's

Yes, you do. Flexi Videos do not include Course-Book or Labs.
We do not track the pass rate of Flexi students. However, we trust it will be lower than for Live Online.
Yes, Course-Book and Lab are not included in the annual plan. All Flexi videos are included.
You will be provided access to LET ( Learning Enhancement Tool), where you will get the links to access all your purchases.
Flexi video for the new version will be provided free of cost.
Videos can only be streamed and not downloaded.
6 months from the date of delivery.
It is only for one user.
Yes, contact us for corporate packages.
Presently, Flexi is only available in English.
Yes, you can pay from this web page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
We use the best standards in Internet security. Any data retained is not shared with third parties.
It’s a unique subscription plan where customers can avail unlimited Flexi courses within a year.
The subscription plan is valid for 1 year from the date of purchase.
No, this is limited to one user and its non-transferable.

Feedbacks from Clients