Description
Registration completed before 08/02/2023 receive $500.00 Discount!
- Delivery Format: Virtual Classroom Live
- Location: ONLINE
Dates are not a fit? Ask about Private Lead Classes for your company teams, with 6 or more employees we will customize training for your organization.
Classroom Live Outline
Lesson 1: Explaining the Importance of Security Controls and Security Intelligence
- Topic 1A: Identify Security Control Types
- Topic 1B: Explain the Importance of Threat Data and Intelligence
Lesson 2: Utilizing Threat Data and Intelligence
- Topic 2A: Classify Threats and Threat Actor Types
- Topic 2B: Utilize Attack Frameworks and Indicator Management
- Topic 2C: Utilize Threat Modeling and Hunting Methodologies
Lesson 3: Analyzing Security Monitoring Data
- Topic 3A: Analyze Network Monitoring Output
- Topic 3B: Analyze Appliance Monitoring Output
- Topic 3C: Analyze Endpoint Monitoring Output
- Topic 3D: Analyze Email Monitoring Output
Lesson 4: Collecting and Querying Security Monitoring Data
- Topic 4A: Configure Log Review and SIEM Tools
- Topic 4B: Analyze and Query Logs and SIEM Data
Lesson 5: Utilizing Digital Forensics and Indicator Analysis Techniques
- Topic 5A: Identify Digital Forensics Techniques
- Topic 5B: Analyze Network-related IOCs
- Topic 5C: Analyze Host-related IOCs
- Topic 5D: Analyze Application-related IOCs
- Topic 5E: Analyze Lateral Movement and Pivot IOCs
Lesson 6: Applying Incident Response Procedures
- Topic 6A: Explain Incident Response Processes
- Topic 6B: Apply Detection and Containment Processes
- Topic 6C: Apply Eradication, Recovery, and Post-incident Processes
Lesson 7: Applying Risk Mitigation and Security Frameworks
- Topic 7A: Apply Risk Identification, Calculation,and Prioritization Processes
- Topic 7B: Explain Frameworks, Policies, and Procedures
Lesson 8: Performing Vulnerability Management
- Topic 8A: Analyze Output from Enumeration Tools
- Topic 8B: Configure Infrastructure Vulnerability Scanning Parameters
- Topic 8C: Analyze Output from Infrastructure Vulnerability Scanners
- Topic 8D: Mitigate Vulnerability Issues
Lesson 9: Applying Security Solutions for Infrastructure Management
- Topic 9A: Apply Identity and Access Management Security Solutions
- Topic 9B: Apply Network Architecture and Segmentation Security Solutions
- Topic 9C: Explain Hardware Assurance Best Practices
- Topic 9D: Explain Vulnerabilities Associated with Specialized Technology
Lesson 10: Understanding Data Privacy and Protection
- Topic 10A: Identify Non-technical Data and Privacy Controls
- Topic 10B: Identify Technical Data and Privacy Controls
Lesson 11: Applying Security Solutions for Software Assurance
- Topic 11A: Mitigate Software Vulnerabilities and Attacks
- Topic 11B: Mitigate Web Application Vulnerabilities and Attacks
- Topic 11C: Analyze Output from Application Assessments
Lesson 12: Applying Security Solutions for Cloud and Automation
- Topic 12A: Identify Cloud Service and Deployment Model Vulnerabilities
- Topic 12B: Explain Service-oriented Architecture
- Topic 12C: Analyze Output from Cloud Infrastructure Assessment Tools
- Topic 12D: Compare Automation Concepts and Technologies
Classroom Live Labs
Labs Available:
- Analyzing Output from Network Security Monitoring Tools
- Analyzing Output from Security Appliance Logs
- Analyzing Output from Endpoint Security Monitoring Tools
- Analyzing Email Headers
- Configuring SIEM Agents and Collectors
- Analyzing, Filtering, and Searching Event Log and syslog Output
- Collecting and Validating Digital Evidence
- Analyzing Network-related IoCs
- Analyzing Host and Application IoCs
- Following an Incident Response Process
- Observing IoCs during a Security Incident
- Reviewing Risk Management Processes
- Analyzing Output from Topology and Host Enumeration Tools
- Testing Credential Security
- Configuring Vulnerability Scanning and Analyzing Outputs
- Assessing Vulnerability Scan Outputs
- Assessing the Impact of Regulation on Vulnerability Management
- Performing Account and Permissions Audits
- Configuring Network Segmentation and Security
- Configuring and Analyzing Share Permissions
- Assessing the Impact of Web Application Vulnerabilities
- Analyzing Output from Web Application Assessment Tools
- Analyzing Output from Cloud Infrastructure Assessment Tools
- Assessing the Impact of Threats to Cloud Infrastructures
Reviews
There are no reviews yet.