Overview

This intensive and practitioner-focused training is designed to help you gain the knowledge, skills, abilities, and confidence required to protect and defend organizational information systems against cyber adversaries

 

Course description

In addition to the full videos of the cyber defense analyst course, this associate course comes with 10 hands on exercises - completed in our cyber defense lab - and a cyber defense project, which will not be graded. Students will also have the opportunity to attempt the certification exam after paying the appropriate fee.

Prerequisite

Basic knowledge of how computers and the Internet work

Who can take this course?

  • Cyber Enthusiasts
  • IT Professionals
  • Students & Graduates
  • Cybersecurity Internship Seekers

This course includes

  • Self-paced; over 13 hours of on-demand video
  • Approximately 9 hours of lab exercises
  • Anytime access (from computer, tablet or mobile phone)
  • Labs and Ungraded Project

 

Learning Objectives

At the end of this course, learners will be able to

 Discuss different types of cyber threats and their relevance in today’s threat landscape

 Categorize cyber threat actors based on their objectives

 Discuss threat modelling and its importance to cyber defense

 Demonstrate good understanding of vulnerabilities in general and their important elements

 Derive a unique identifier for any particular vulnerability based on its published date

 Remember how vulnerabilities are rated

 Understand the role of vulnerability in cyber attacks

 Recall common types of vulnerabilities

 Understand and remember common sources of vulnerabilities intelligence

 Explain the vulnerability management lifecycle

 Discuss cyber-attack tactics, techniques, and procedures

 Briefly explain the cyber kill chain model

 Briefly explain the Mandiant attack lifecycle

 Discuss the MITRE ATT&CK framework while recalling its key tactics and techniques

 Discuss each of the data breach incidents covered in terms of what happened, how it happened, why it happened, the business impact, and how it could have been prevented

 Discuss the NIST cybersecurity framework and recall its functions and major categories

 Describe each of the five functional areas of the framework and the respective key categories

 Categorize various cyber security vendors in accordance with the security domains addressed by their specific products

 Recall the various layers of cyber defense and their respective security technology solutions

Demonstrate good understanding of the people, process, and technology elements of a (SOC)

 Itemize key log sources and explain the logging and log collection process

 Discuss the importance of the SIEM to a SOC

 Recall the key players in the SIEM market space

 Express their career progression options if they ever end up working in a SOC

 Demonstrate good understanding of security alerts

 Define alert use cases and describe how they are developed

 Discuss actionable reports and how to derive the best value out of them

 Demonstrate good understanding of the tasks undertaken by SOC analysts on daily basis

 Recall all the phases of incident response and what goes on in each phase

 List some of the important tools to have in an incident response jump kit

 State and discuss some of the key factors that affect incident categorization

 Interpret an incident response workflow

 Demonstrate good understanding of the values that managed security service providers (MSSPs) bring to the table and key considerations for outsourcing

 Differentiate between an MSSP and a managed detection and response (MDR) service provider

 State key reasons why an organization might want to consider subscribing to an incident response retainer service

 List the features and benefits of an internally developed and delivered threat intelligence service

 Define cyber law and demonstrate basic understanding of intellectual property law and different types of intellectual property

 Recall elements of the cybersecurity enhancement act of 2014 and how it contributes to the efforts to protect the U.S. businesses and government agencies against cyber threats

 Recall elements of the national cybersecurity protection act of 2014 and how it contributes to the efforts to protect the U.S. businesses and government agencies against cyber threats

 Demonstrate an understanding of the key aspects of the Sarbanes-Oxley act and how to support related audit and compliance efforts from a cyber security standpoint

 State the objectives of the Federal Information Systems Modernization Act of 2014 and key improvements over its predecessor (FISMA 2002)

 Demonstrate good understanding of HIPAA and mastery of the key cyber security activities required to keep an organization compliant

 Recall key elements of the European General Data Protection Act (GDPR)

Course Curriculum

  SECTION 1 - THE NICE FRAMEWORK AND CYBER SECURITY ESSENTIALS
Available in days
days after you enroll
  SECTION 2 - CYBER THREATS, VULNERABILITIES AND ATTACKS
Available in days
days after you enroll
  SECTION 3 – PROTECTIVE CYBER SECURITY TECHNOLOGIES
Available in days
days after you enroll
  SECTION 4 - ELEMENTS OF A SECURITY OPERATIONS CENTER (SOC)
Available in days
days after you enroll
  SECTION 5 – CYBER RISK MANAGEMENT, LAWS, AND GOVERNANCE
Available in days
days after you enroll
  SECTION 6 - INCIDENT RESPONSE SCENARIOS
Available in days
days after you enroll
  Wrap up
Available in days
days after you enroll

Cyber Defense Lab


Our lab environment closely mirrors the real-world business environment where students get to play the role of a cyber security professional.

10 Unique Cyber Security Challenges!


Solve real world cyber security challenges by following structured incident response steps

Choose a Pricing Option


$399

Cyber Defense Associate

Full (90-day) access to all course videos (approximately 14 hours), 10 practical exercises with solutions and cyber defense project (ungraded)


Pay here if you live in Nigeria


₦187,530

Cyber Defense Associate - Nigeria

We’re offering 67% discount off all our courses that are purchased from Nigeria! To take full advantage of this, use the coupon code 4NAIJA at checkout.