Skip to content
- Be able to deploy and manage key security technologies (MFA, EDR, SEG):
- MFA: Learn how to enforce MFA for all accounts, support remote staff setup, and handle common issues (lost phone, token reset).
- EDR: Learn how to configure policies, respond when processes are blocked, and analyse logs to find and solve problems.
- SEG: Learn how to set phishing filter policies, update them regularly, and review reports to improve filtering.
- Be able to respond quickly in attack simulations, achieving an initial response within 1 hour.
- Learn how to design and run simulated attack exercises and analyse the results.
Scroll to top