Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today’s needs. When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today’s exploits. This course maps to the mile2 Certified Cyber Security Analyst Exam as well as

starstarstarstarstar_outline

* Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Learning Objectives

Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.
Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today's needs.
When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today's exploits.
This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam.

1
  • Blue Team Principles

  • Network Architecture?and how it lays the groundwork
    Defensive Network
    Security Data Locations?and how they tie together
    Security?Operations?Center
    The People, Processes, and Technology
    Triage and Analysis
    Digital Forensics
    Incident Handling
    Vulnerability Management
    Automation, Improvement, and Tuning

2
  • Digital Forensics

  • Investigative Theory and?Processes
    Digital Acquisition
    Evidence Protocols
    Evidence Presentation
    Computer Forensics?Laboratory
    Protocols
    Processing Techniques
    Specialized?Artifacts
    Advanced Forensics for Today’s?Exploitations

3
  • Malware Analysis

  • Creating the Safe Environment
    Static Analysis
    Dynamic Analysis
    Behavior Based Analysis
    What is different about?Ransomware?
    Manual Code Reversing

4
  • Traffic Analysis

  • Manual Analysis Principles
    Automated?Analysis Principles
    Signatures?compared to?Behaviors
    Application Protocols Analysis Principles
    Networking Forensics

5
  • Assessing the Current State of Defense with the Organization

  • Network Architecture and Monitoring
    Endpoint Architecture and Monitoring
    Automation, Improvement, and continuous?monitoring

6
  • Leveraging SIEM for Advanced Analytics

  • Architectural Benefits
    Profiling and?Baselining
    Advanced Analytics

7
  • Defeating the Red Team with Purple Team tactics

  • Penetration Testing?with full knowledge
    Reconnaissance
    Scanning
    Enumeration
    Exploitation
    Lateral Movement

Audience

Security Professionals Incident Handling Professionals Anyone in a Security Operations Center Forensics Experts Cybersecurity Analysts

Language

English

Prerequisites

There are no stated prerequisites for this course. Please check with your representative for details.

$3,500

Length: 5.0 days (40 hours)

Level:

Not Your Location? Change

Course Schedule:

To request a custom delivery, please chat with an expert.

Loading...