Threat Intelligence Security Threat Intelligence E-Learning
Security Threat Intelligence E-Learning Training
Welcome to the Security Threat Intelligence Learning Kit, where you will discover how to protect an organization from both external and internal threats using processes and tools to gather and analyze information.
The focus will be on security programming, malware removal, network survey & extractions, defensive CyberOps, network & host analysis, forensic analysis, and threat intelligence & attribution best practices.
Learning Kits are structured learning paths, mainly within the Emerging Tech area. A Learning Kit keeps
the student working toward an overall goal, helping them to achieve your career aspirations. Each part takes the student step by step through a diverse set of topic areas. Learning Kits are
made up of required tracks, which contain all of the learning resources available such as Assessments (Final Exams), Mentor, Practice Labs and of course E learning. And all resources with a 365 days access from first activation.
E-learning courses (22 hours +)
CyberOps: Introduction to CyberOps
Security Programming: Command Line Essentials
Security Programming: Code Identification
Security Programming: Scripting Essentials
Security Programming: System Essentials
Malware Removal: Identifying Malware Types & Classification Approaches
Malware Removal: Analyzing an Infected System
Malware Removal: Remediate an Infected System
Malware Removal: Reporting Findings & Preventing Future Infections
Network Survey & Extraction: Network Analysis
Network Survey & Extraction: Network Monitoring
Defensive CyberOps: Defensive Cyberspace Operations
Network & Host Analysis: Protocol Analysis
Network & Host Analysis: Network Protocols
Network & Host Analysis: Network Observations
Network & Host Analysis: Network Analysis Formats
Network & Host Analysis: Network Operations
Forensic Analysis: Cybercrime Investigations
CyberOps Windows Hardening: Windows Server Hardening Best Practices
CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
Threat Intelligence & Attribution Best Practices: Attribution Analysis
Assessment: Security Threat Intelligence
Will test your knowledge and application of the topics presented throughout the Security Threat Intelligence courses.
Practice Lab: Security Threat Intelligence (estimated duration: 8 hours)
Perform security threat intelligence tasks such as scanning networks, connecting to remote hosts, scanning websites for vulnerabilities, and using Wireshark to save packet captures. Then perform packet filtering, program verification, scripting and test a service for weaknesses or vulnerabilities.
- Online access
- 365 days
- Lesson duration
- 23 hours
There are no reviews written yet about this product..