Detailed Course Outline
- 1. Attack Methodologies and the ATP Framework
- 2. Key Components
- 3. High Availability, Maintenance and Troubleshooting
- 4. Protecting the Edge
- 5. Protecting Email Networks
- 6. Protecting Web Applications
- 7. Protecting End Users
- 8. Protecting Third-Party Appliances
- 9. Results Analysis