What is in Cybersecurity Practitioner
Outline
Get Register
Outline
Outline for this course
Module 1: IdentifyKey Topics: Network Infrastructure and Digital Assets, Asset Identification, Network Topology and Data Flow Analysis, Data Flow Identification, Security Review and Gap Identification, Enterprise Asset Identification, Security Policy and Procedure Development, Data Flow Analysis, Enterprise Data Flow Analysis, Regulation and Legal Impact, Threat Modeling, Identify Challenge
Module 2: Protect
Key Topics: Vulnerability Testing, Security Tools and Systems, Firewall Setup, Incident Response Plans, Security and Business Functions, Backup and Restore Points, Security Configuration Evaluation, File System Protections OS Baseline, Protect Challenge
Module 3: Detect
Key Topics: Event and Incident Identification, Sec Onion Setup and Testing, Snort Rules, Event Detection, Malicious Activity Analysis, Data and Network Analysis, Vulnerability Analysis, Detect Challenge
Module 4: Respond & Recover
Key Topics: Incident Notification and Containment, Incident Correlation, Evidence Collection and Technical Analysis, Network Forensics, Malware Investigation and Evaluation, System Validation Re-Imaging, Post Incident Security Plan and Procedure, Restore Points, Response Challenge
Get Register