After completion of the course, students will be able to: Assess information security risk in computing and network environments Analyze the cybersecurity threat landscape Analyze reconnaissance threats to computing and network environments Analyze attacks on computing and network environments Analyze post-attack techniques on computing and network environments Implement a vulnerability management program Evaluate the organization's security through penetration testing
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
Description
- Assessing Information Security Risk
- Analyzing the Threat Landscape
- Analyzing Reconnaissance Threats to Computing and Network Environments
- Analyzing Attacks on Computing and Network Environments
- Analyzing Post-Attack Techniques
- Managing Vulnerabilities in the Organization
- Implementing Penetration Testing to Evaluate Security
- Collecting Cybersecurity Intelligence
- Analyzing Log Data
- Performing Active Asset and Network Analysis
- Responding to Cybersecurity Incidents
- Investigating Cybersecurity Incidents
- Addressing Security Architecture Issues
Prerequisites
- At least two years (recommended) of experience in computer network security technology or a related field.
- The ability to recognize information security vulnerabilities and threats in the context of risk management.
- Foundation-level operational skills with some of the common operating systems for computing environments.
- Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
- Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
- Foundational knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
- Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and VPNs.
Audience
- Security specialists
- CSIRT analysts
- SOC operators