In this course, you will identify, assess, respond to, and protect against security threats and operate a system and network security analysis platform.
You will:
• Assess cybersecurity risks to the organization.
• Analyze the threat landscape.
• Analyze various reconnaissance threats to computing and network environments.
• Analyze various attacks on computing and network environments.
• Analyze various post-attack techniques.
• Assess the organization’s security posture through auditing, vulnerability management, and penetration testing.
• Collect cybersecurity intelligence from various network-based and host-based sources.
• Analyze log data to reveal evidence of threats and incidents.
• Perform active asset and network analysis to detect incidents.
• Respond to cybersecurity incidents using containment, mitigation, and recovery tactics.
• Investigate cybersecurity incidents using forensic analysis techniques.
To ensure your success in this course, you should meet the following requirements:
• At least two years (recommended) of experience or education in computer network security technology or a related field.
• The ability or curiosity to recognize information security vulnerabilities and threats in the context of risk management.
• Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.
• General knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
• Foundation-level skills with some of the common operating systems for computing environments.
• Entry-level understanding of some of the common concepts for network environments, such as routing and switching.
• General or practical knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
Lesson 1: Assessing Cybersecurity Risk
Lesson 2: Analyzing the Threat Landscape
Lesson 3: Analyzing Reconnaissance Threats to Computing and Network Environments
Lesson 4: Analyzing Attacks on Computing and Network Environments
Lesson 5: Analyzing Post-Attack Techniques
Lesson 6: Assessing the Organization’s Security Posture
Lesson 7: Collecting Cybersecurity Intelligence
Lesson 8: Analyzing Log Data
Lesson 9: Performing Active Asset and Network Analysis
Lesson 10: Responding to Cybersecurity Incidents
Lesson 11: Investigating Cybersecurity Incidents
Appendix A: Mapping Course Content to CyberSec First Responder® (Exam CFR-410)
Appendix B: Regular Expressions
All prices on our website are subject to change without notice.
Please request a formal quote
© 2024 Copyright CTU Training Solutions. All Rights Reserved.