The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization’s security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

starstarstarstarstar_half

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Assess information security risk in computing and network environments.Collect cybersecurity intelligence.Perform active analysis on assets and networks.Address security issues with the organizations technology architecture. Ready for certification exam.

1
  • Assessing Information Security Risk

  • Identify the Importance of Risk Management
    Assess Risk
    Mitigate Risk
    Integrate Documentation into Risk Management

2
  • Analyzing the Threat Landscape

  • Classify Threats and Threat Profiles
    Perform Ongoing Threat Research
    Implement Threat Modeling

3
  • Analyzing Reconnaissance Threats to Computing and Network Environments

  • Assess the Impact of Reconnaissance Incidents
    Assess the Impact of Social Engineering Lesson

4
  • Analyzing Attacks on Computing and Network Environments

  • Assess the Impact of System Hacking Attacks
    Assess the Impact of Web-Based Attacks
    Assess the Impact of Malware
    Assess the Impact of Hijacking and Impersonation Attacks

5
  • Analyzing Post-Attack Techniques

  • Assess the Impact of DoS Incidents
    Assess the Impact of Threats to Mobile Security
    Assess the Impact of Threats to Cloud Securty
    Assess Command and Control Techniques
    Assess Persistence Techniques
    Assess Lateral Movement and Pivoting Techniques
    Assess Data Exfiltration Techniques
    Assess Anti-Forensics Techniques

6
  • Managing Vulnerabilities in the Organization

  • Implement a Vulnerability Management Plan
    Assess Common Vulnerabilities
    Conduct Vulnerability Scans

7
  • Implementing Penetration Testing to Evaluate Security

  • Conduct Penetration Tests on Network Assets
    Follow Up on Penetration Testing

8
  • Collecting Cybersecurity Intelligence

  • Collect Data from Network-Based Intelligence Sources
    Collect Data from Host-Based Intelligence Sources

9
  • Analyzing Log Data

  • Use Common Tools to Analyze Logs
    Use SIEM Tools for Analysis
    Parse Log Files with Regular Expressions

10
  • Performing Active Asset and Network Analysis

  • Analyze Incidents with Windows-Based Tools
    Analyze Incidents with Linux-Based Tools
    Analyze Malware
    Analyze Indicators of Compromise

11
  • Responding to Cybersecurity Incidents

  • Deploy an Incident Handling and Response Architecture
    Mitigate Incidents

12
  • Investigating Cybersecurity Incidents

  • Prepare for Forensic Investigation as a CSIRT
    Apply a Forensic Investigation Plan
    Securely Collect and Analyze Electronic Evidence
    Follow Up on the Results of an Investigation

13
  • Addressing Security Architecture Issues Review / Exam

  • Remediate Identity and Access Management Issues
    Implement Security During the SDLC

Audience

This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

Language

English

Prerequisites

There are no stated prerequisites for this course. Please check with your representative for details.

$2,800

Length: 5.0 days (40 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...