Security Threat Intelligence E-Learning Training Certified Teachers Exam Quizzes Assessments Exam Live Labs Tips Tricks Certificate.
Read more.
Make a choice
Officieel examen Online of fysiek
Start nu – bekroonde e-learning Inclusief proefexamens & 24/7
ISO 9001 & 27001 werkwijze 1000+ organisaties gingen u voor
Maatwerk & gratis intake Inclusief nulmeting bij training
Product description
Security Threat Intelligence E-Learning Training
Master threat intelligence to anticipate and counteract cyber attacks.
In today’s digital age, it’s not enough to respond to threats—you must anticipate them. This training teaches you how to collect, analyze, and act on cyber threat intelligence to protect organizations from internal and external threats. You'll gain expertise in malware analysis, network forensics, CyberOps, and security attribution.
What you’ll learn:
Gathering and analyzing cyber threat intelligence
Performing host and network analysis
Identifying and removing malware
Conducting forensic and attribution analysis
Applying best practices in threat detection and response
This course is part of an Agile Learning Kit and includes e-learning, hands-on labs, mentoring, and 365-day access.
Why Choose This Training?
Become proactive in detecting and mitigating cyber threats
Gain practical skills in network investigation and forensics
Learn how to build a threat intelligence strategy
Includes labs, assessments, mentoring, and full access for 365 days
Ideal for those going beyond entry-level cybersecurity
Who Should Enroll?
This course is perfect for:
Cybersecurity specialists seeking advancement in threat intelligence
Network and systems administrators involved in monitoring
SOC analysts and incident responders
Security teams in both public and private sectors
This Learning Kit, with more than 23 hours of online content, is divided into the following tracks:
CyberOps Windows Hardening: Windows Server Hardening Best Practices
Course: 1 Hour, 33 Minutes
Course Overview
BIOS/UEFI Settings to Improve Workstation Security
Hardening User Accounts on a Windows Workstation
Implementing AppLocker Policies on Windows
Hardening Windows Services and Removing Software
Patching Windows Systems
Implementing a Windows Workstation Password Policy
Implementing a Windows Account Lockout Policy
Configuring Windows User Rights
Implementing Full Disk Encryption with BitLocker
Encrypting USB Drives with BitLocker To Go
Using Windows Defender as an Antivirus Tool
Configuring Auditing on a Windows Workstation
Using Security Templates on a Windows Workstation
Course Summary
CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
Course: 1 Hour, 30 Minutes
Course Overview
BIOS/UEFI Settings to Improve Workstation Security
Hardening User Accounts on a Windows Workstation
Implementing AppLocker Policies on Windows
Hardening Windows Services and Removing Software
Patching Windows Systems
Implementing a Windows Workstation Password Policy
Implementing a Windows Account Lockout Policy
Configuring Windows User Rights
Implementing Full Disk Encryption with BitLocker
Encrypting USB Drives with BitLocker To Go
Using Windows Defender as an Antivirus Tool
Configuring Auditing on a Windows Workstation
Using Security Templates on a Windows Workstation
Course Summary
Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
Course: 1 Hour, 40 Minutes
Course Overview
Threat Intelligence
Key Elements of Threat Intelligence
The Value of Threat Intelligence
Using Threat Intelligence
Cyber Threat Actors
Common Indicators of Compromise
Intelligence versus Data versus Information
Threat Intelligence Lifecycle
Strategic Threat Intelligence
Tactical Threat Intelligence
Operational Threat Intelligence
Technical Threat Intelligence
Machine Learning and Threat Intelligence
Risk Modeling and Threat Intelligence
Threat Intelligence Use Cases
The Threat Landscape
Intrusion Detection and Analysis
Threat Intelligence Sources
Course Summary
Assessment: Security Threat Intelligence
Will test your knowledge and application of the topics presented throughout the Security Threat Intelligence courses.
Practice Lab: Security Threat Intelligence (estimated duration: 8 hours)
Perform security threat intelligence tasks such as scanning networks, connecting to remote hosts, scanning websites for vulnerabilities, and using Wireshark to save packet captures. Then perform packet filtering, program verification, scripting and test a service for weaknesses or vulnerabilities.
Heeft u vragen over dit product of hulp nodig bij het bestellen? Onze AI-chatbot is 24/7 beschikbaar, of neem contact op via [email protected] of bel +31 36 760 1019
Heeft u vragen over dit product of hulp nodig bij het bestellen? Onze AI-chatbot is 24/7 beschikbaar, of neem contact op via [email protected] of bel +31 36 760 1019
Wij gebruiken functionele en analytische cookies om onze website goed te laten werken en het gebruik ervan te meten met Google Analytics. Er worden geen persoonsgegevens gedeeld voor advertentiedoeleinden. Door op "Accepteren" te klikken, geeft u toestemming voor het plaatsen van deze cookies.
Manage cookies