Security Threat Intelligence Security Threat Intelligence E-Learning
Security Threat Intelligence E-Learning
€349,00 €299,00
Security Threat Intelligence
Aanbieding

Security Threat Intelligence E-Learning

EUR 299,00
EUR 349,00 Excl. btw

Bestel de E-Learning training Beveiligen Security Threat Intelligence online, Online mentor, MeasureUp sim. en tips trucs

  • E-Learning - Online toegang: 365 dagen
  • Taal: Engels (US)
  • Certificaat van deelname
Op voorraad
Bestel voor 16:00 uur en start vandaag.
Aantal
- +
  • Voor 23:00 uur besteld, morgen in huis
  • Certificaat van deelname
  • Bedrijven bestellen op factuur
  • Betaal in 3x geen extra kosten 0% rente en zonder BKR met in3
  • Meer informatie? Neem contact op over dit product
Productomschrijving

Security Threat Intelligence E-Learning Training

De Training Security Threat Intelligence via een Speciale Certificeringspakket. 1 Jaar toegang tot revolutionaire E-Learning om het examen Gemakkelijk te halen. Laat je Introduceren door te Leren via 1 Leerportaal (LMS) met Gecertificeerde Docenten. Exclusief 24/7 Online Mentor en Uitdagende Cursus Testen en Bekijk Achter de schermen alle Tips & Tricks.
Gegarandeerd altijd het Officieel Proefexamen en na de Training een Officieel Certificaat van Deelname. Optioneel Livelabs (meerprijs).


Cursusinhoud

CyberOps: Introduction to CyberOps

Course: 54 Minutes

Course Overview
Introduction to Defensive Cyber Operations
Introduction to Offensive Cyber Operations
Using Nessus to Perform a Vulnerability Scan
Using Metasploit to Attack Systems
Comparing OCO with DCO Operations
Introducing the Cyber Operations Cycle
Phases of the Cyber Operations Cycle
Offensive Team Roles
Defensive Team Roles
Supporting Team Roles
Course Summary

Security Programming: Command Line Essentials

Course: 58 Minutes

Course Overview
Command Line Properties
Bash Properties
PowerShell Environment
Text Editing Basics
Text Processing
Bash History
Process Management
Scheduled Jobs
File Monitoring
File Comparison
Redirecting Input and Output
Package Management
Course Summary

Security Programming: Code Identification

Course: 1 Hour, 9 Minutes

Course Overview
Coding Paradigms
Identifying Bash Scripts
Identifying Python Scripts
Identifying C programs
Identifying C++ programs
Identifying C# programs
Identifying Regular Expressions
Identifying PowerShell Scripts
Identifying SQL Code
Common Code Vulnerabilities
Identifying Binary Files
Verifying Downloaded Files
Course Summary

Security Programming: Scripting Essentials

Course: 1 Hour, 1 Minute

Course Overview
Introduction to Scripting
Bash Variables
Bash Conditionals
Bash Loops
Bash Functions
Python Variables
Python Conditionals
Python Loops
Python Functions
Python Imports
Python File Operations
Python Web Requests
Course Summary

Security Programming: System Essentials

Course: 57 Minutes

Course Overview
Remote Shell Access
User Accounts
IP Routing
Network Interfaces
Domain Names
Log Files
Process Reporting
Disk Use
User Activity
System Activity
Time and Date Services
/etc Configurations
Course Summary

Malware Removal: Identifying Malware Types & Classification Approaches

Course: 26 Minutes

Course Overview
Introduction to Traditional Malware Types
Understanding Worm and Trojan Viruses
Identifying Rootkits, Botnets, and Ransomware
Understanding Malware Symptoms
Tools to Fight Against Malware
Classifying the Severity of Malware
Course Summary

Malware Removal: Analyzing an Infected System

Course: 1 Hour, 45 Minutes

Course Overview
Why Analyze Malware
Introduction to Static Analysis
Introduction to Dynamic Analysis
Malware Characteristics
Static Malware Analysis
Dynamic Malware Analysis
Malware Impacts
Ports and Processes Used By Malware
Process Monitor
Wireshark
Malicious Code and Program Flow
Course Summary

Malware Removal: Remediate an Infected System

Course: 50 Minutes

Course Overview
Symptoms of an Infected System
Best Practices for Malware Removal
Remediation Approaches for Malware
Windows Malicious Software Removal Tool
Using Restore Points
Using Windows Repair Tools with Restore Points
Restoring a System Backup
Comparing Virus Removal to Complete Re-install
Viruses Affecting your Boot Environment
Using Windows Repair Tools to Solve Boot Issues
Course Summary

Malware Removal: Reporting Findings & Preventing Future Infections

Course: 31 Minutes

Course Overview
Responding to Malware Incidents
Reporting Malware Incidents
Preventing Future Malware Incidents
Planning For Recovery
Creating a System Image
Course Summary

Network Survey & Extraction: Network Analysis

Course: 58 Minutes

Course Overview
Network Scanning Tools
Identifying Network Vulnerabilities
Alternative Network Vulnerabilities
Efficient Network Scanning
Reverse IP Lookup
Identifying Services
Operating System Identification
UDP Scanning
Stealth Scanning
Connect Scanning
Zombie Scanning
ARP Scanning
Course Summary

Network Survey & Extraction: Network Monitoring

Course: 52 Minutes

Course Overview
Actively Monitoring Services
Managing Collected Data
Vulnerability Metrics
Network Reporting and Record Keeping
DNS Host Discovery
Netcat Banner Grabbing
Tcpdump Connection Filtering
Tcpdump Protocol Filtering
Gathering Site Reports
Firewall Scanning
SSL/TLS Scanning
SMTP Scanning
Course Summary

Defensive CyberOps: Defensive Cyberspace Operations

Course: 43 Minutes

Course Overview
Principles of Defensive Cyber Operations
DCO Measures and Response
DCO and Cybersecurity
DCO Maneuver Operations
DCO Analytics
DCO Missions
DCO Operating Domains
DCO Mission Owner
DCO Network Owner
DCO Planning Considerations
DCO Threat Detection and Characterization
DCO Tools and Capabilities
Course Summary

Network & Host Analysis: Protocol Analysis

Course: 58 Minutes

Course Overview
Network Data Pattern Analysis
The Open Systems Interconnection (OSI) Model
Passive and Active Scanning Approches
Capturing Traffic Using Wireshark
Filtering Traffic Using Wireshark
Customizing Packet Capturing in Wireshark
Saving and Exporting Captures in Wireshark
Highlighting Rules Using Wireshark
Extracting Files Using Wireshark
Configuring Profiles in Wireshark
Controlling Filter Display in Wireshark
Implementing Advanced Filtering in Wireshark
Course Summary

Network & Host Analysis: Network Protocols

Course: 1 Hour

Course Overview
Filtering DNS Traffic
Filtering TCP Traffic
Filtering UDP Traffic
Capturing ICMP Traffic
Examining HTTP Traffic
Inspecting SSH Traffic
Extracting FTP Traffic
Filtering Email Traffic
Capturing ARP Traffic
Capturing DHCP Traffic
Monitoring Telnet Sessions
Filtering IPv6 Traffic
Course Summary

Network & Host Analysis: Network Observations

Course: 1 Hour

Course Overview
Displaying Protocol Hierarchies in Wireshark
Identifying Endpoints Using Wireshark
Visualizing Networks
Visualizing Networks in Visio
Assessing Networks
Developing Baselines
Baselining in Wireshark
Wireshark Capture Engines
Creating Rules in Wireshark
Detecting Scans Using Wireshark
Tunneling Remotely Using Wireshark
Course Summary

Network & Host Analysis: Network Analysis Formats

Course: 1 Hour

Course Overview
NetFlow and IPFIX Collection
NetFlow and Baselining
The Benefit of Audit Logs
Application Access Control
Tapping Network Traffic
Emitting and Aggregating Logs
Queueing Events
Network Management with SNMP
Packet Capturing with PCAP
Whitelisting Applications
Using Wireshark for Event Detection
Importing and Exporting PCAP
Course Summary

Network & Host Analysis: Network Operations

Course: 1 Hour, 1 Minute

Course Overview
Network Defense Tools
Implementing NSM
SIEM for Threat Activity
Installing Suricata
Applying Suricata Rules
Creating Suricata Alerts
Generating Suricata Logs
Installing ELK Stack Prerequisites
Installing ELK Stack
Integrating Suricata and ELK Stack
Navigating Kibana for SIEM
Integrating Suricata and Wireshark
Course Summary

Forensic Analysis: Cybercrime Investigations

Course: 1 Hour, 38 Minutes

Course Overview
Packet Captures
Network Forensics
Capturing Network Traffic
Working With PCAP Files
Volatile Data
Memory Forensics Tools
Using the Volatility Framework
Windows Registry
Locating Evidence Within the Registry
Registry Analysis Tools
Categories of Digital Evidence
Gathering Digital Evidence
Computer Forensic Analysis Tools
SANS Investigative Forensic Toolkit (SIFT)
Analyzing Evidence Using SIFT
Course Summary

CyberOps Windows Hardening: Windows Server Hardening Best Practices

Course: 1 Hour, 33 Minutes

Course Overview
Windows Server Hardening Best Practices
Removing Unnecessary Windows Server Software
Hardening Network Services on a Windows Server
Windows Server User Account Hardening Best Practices
Securing Windows Accounts with a Password Policy
Configuring a Windows Server Account Lockout Policy
Limiting Windows Server Group Membership
Windows Server File System Hardening Techniques
Modifying Windows Server User Rights
Hardening Windows Servers with Additional Software
Hardening Windows DNS Servers
Hardening Windows IIS Web Servers
Auditing and Windows Server Hardening
Using Auditing to Monitor Windows Server Activity
Course Summary

CyberOps Windows Hardening: Windows Workstation Hardening Best Practices

Course: 1 Hour, 30 Minutes

Course Overview
BIOS/UEFI Settings to Improve Workstation Security
Hardening User Accounts on a Windows Workstation
Implementing AppLocker Policies on Windows
Hardening Windows Services and Removing Software
Patching Windows Systems
Implementing a Windows Workstation Password Policy
Implementing a Windows Account Lockout Policy
Configuring Windows User Rights
Implementing Full Disk Encryption with BitLocker
Encrypting USB Drives with BitLocker To Go
Using Windows Defender as an Antivirus Tool
Configuring Auditing on a Windows Workstation
Using Security Templates on a Windows Workstation
Course Summary

Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts

Course: 1 Hour, 40 Minutes

Course Overview
Threat Intelligence
Key Elements of Threat Intelligence
The Value of Threat Intelligence
Using Threat Intelligence
Cyber Threat Actors
Common Indicators of Compromise
Intelligence versus Data versus Information
Threat Intelligence Lifecycle
Strategic Threat Intelligence
Tactical Threat Intelligence
Operational Threat Intelligence
Technical Threat Intelligence
Machine Learning and Threat Intelligence
Risk Modeling and Threat Intelligence
Threat Intelligence Use Cases
The Threat Landscape
Intrusion Detection and Analysis
Threat Intelligence Sources
Course Summary

Specificaties
Levertijd Binnen 1 werkdag
Online toegang 365 dagen
Lesduur 20:39 uur
Studiebelasting Variabel i.v.m. praktijkopdrachten.
Leermethoden Instructie video, Demonstratie video, Knowledge Base
Besturingssystemen Microsoft Windows, Google Chrome OS, Apple MacOS
Inbegrepen dienstverlening Contact met docent per mail en chat, Voortgangsrapportage, 24/7 online toegang
Ondersteunde browsers Internet Explorer, Edge, Firefox, Safari en Chrome
MOS Examen Mogelijk voor bijbehorend examennummer
Toegang tot docent Per mail en chat
Extra Opties Virtual Labs (indien beschikbaar)
Wat onze klanten zeggen

average of 0 review(s)

Geen reviews gevonden
Help ons en andere klanten door het schrijven van een review
Mijn account
You are not logged in. Log in to make use of all the benefits. Or create an account now.
Taal
Winkelwagen
Uw winkelwagen is leeg
Menu
Zoeken
Search suggestions
Geen cursussen of trainingen gevonden...
Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »