Course Objectives
With completion of this course you will be prepared to:
- Detect and analyze indicators of malicious activity Understand threat hunting and threat intelligence concepts Use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities Perform incident response processes Understand reporting and communication concepts related to vulnerability management and incident response activities
Agenda
- Topic 1A: Understanding Cybersecurity Leadership Concepts
- Topic 1B: Exploring Control Types and Methods
- Topic 1C: Explaining Patch Management Concepts
- Topic 2A: Exploring Threat Actor Concepts
- Topic 2B: Identifying Active Threats
- Topic 2C: Exploring Threat-Hunting Concepts
- Topic 3A: Reviewing System and Network Architecture Concepts
- Topic 3B: Exploring Identity and Access Management (IAM)
- Topic 3C: Maintaining Operational Visibility
- Topic 4A: Exploring Leadership in Security Operations
- Topic 4B: Understanding Technology for Security Operations
- Topic 5A: Explaining Compliance Requirements
- Topic 5B: Understanding Vulnerability Scanning Methods
- Topic 5C: Exploring Special Considerations in Vulnerability Scanning
- Topic 6A: Understanding Vulnerability Scoring Concepts
- Topic 6B: Exploring Vulnerability Context Considerations
- Topic 7A: Explaining Effective Communication Concepts
- Topic 7B: Understanding Vulnerability Reporting Outcomes and Action Plans
- Topic 8A: Exploring Incident Response Planning
- Topic 8B: Performing Incident Response Activities
- Topic 9A: Understanding Incident Response Communication
- Topic 9B: Analyzing Incident Response Activities
- Topic 10A: Identifying Malicious Activity
- Topic 10B: Explaining Attack Methodology Frameworks
- Topic 10C: Explaining Techniques for Identifying Malicious Activity
- Topic 11A: Exploring Network Attack Indicators
- Topic 11B: Exploring Host Attack Indicators
- Topic 11C: Exploring Vulnerability Assessment Tools
- Topic 12A: Analyzing Web Vulnerabilities
- Topic 12B: Analyzing Cloud Vulnerabilities
- Topic 13A: Understanding Scripting Languages
- Topic 13B: Identifying Malicious Activity Through Analysis
- Topic 14A: Exploring Secure Software Development Practices
- Topic 14B: Recommending Controls to Mitigate Successful Application Attacks
- Topic 14C: Implementing Controls to Prevent Attacks
FREE
Interested in course?
Course Type: Instructor Led