Overview

This course will equip leaners with knowledge of cyber security essentials, threats and vulnerabilities, various security technology products, security operations, and incident response.


Prerequisite

Basic knowledge of how computers and the Internet work


Who can take this course?

  • Cyber Enthusiasts
  • IT Professionals
  • Students & Graduates
  • Cybersecurity Internship Seekers


This course includes

  • Self-paced; over 10 hours of on-demand video
  • 60 days of access to training videos
  • 1 lab exercise
  • Anytime access (from computer, tablet or mobile phone)

 

Learning Objectives

At the end of this course, learners will be able to

 Discuss different types of cyber threats and their relevance in today’s threat landscape

 Categorize cyber threat actors based on their objectives

 Discuss threat modelling and its importance to cyber defense

 Demonstrate good understanding of vulnerabilities in general and their important elements

 Derive a unique identifier for any particular vulnerability based on its published date

 Remember how vulnerabilities are rated

 Understand the role of vulnerability in cyber attacks

 Recall common types of vulnerabilities

 Understand and remember common sources of vulnerabilities intelligence

 Explain the vulnerability management lifecycle

 Discuss cyber-attack tactics, techniques, and procedures

 Briefly explain the cyber kill chain model

 Briefly explain the Mandiant attack lifecycle

 Discuss the MITRE ATT&CK framework while recalling its key tactics and techniques

 Discuss each of the data breach incidents covered in terms of what happened, how it happened, why it happened, the business impact, and how it could have been prevented

 Discuss the NIST cybersecurity framework and recall its functions and major categories

 Describe each of the five functional areas of the framework and the respective key categories

 Categorize various cyber security vendors in accordance with the security domains addressed by their specific products

 Recall the various layers of cyber defense and their respective security technology solutions

Demonstrate good understanding of the people, process, and technology elements of a (SOC)

 Itemize key log sources and explain the logging and log collection process

 Discuss the importance of the SIEM to a SOC

 Recall the key players in the SIEM market space

 Express their career progression options if they ever end up working in a SOC

 Demonstrate good understanding of security alerts

 Define alert use cases and describe how they are developed

 Discuss actionable reports and how to derive the best value out of them

 Demonstrate good understanding of the tasks undertaken by SOC analysts on daily basis

 Recall all the phases of incident response and what goes on in each phase

 List some of the important tools to have in an incident response jump kit

 State and discuss some of the key factors that affect incident categorization

 Interpret an incident response workflow

 Demonstrate good understanding of the values that managed security service providers (MSSPs) bring to the table and key considerations for outsourcing

 Differentiate between an MSSP and a managed detection and response (MDR) service provider

 State key reasons why an organization might want to consider subscribing to an incident response retainer service

 List the features and benefits of an internally developed and delivered threat intelligence service

Course Curriculum

  SECTION 1 - THE NICE FRAMEWORK AND CYBER SECURITY ESSENTIALS
Available in days
days after you enroll
  SECTION 2 - CYBER THREATS, VULNERABILITIES AND ATTACKS
Available in days
days after you enroll
  SECTION 3 – PROTECTIVE CYBER SECURITY TECHNOLOGIES
Available in days
days after you enroll
  SECTION 4 - ELEMENTS OF A SECURITY OPERATIONS CENTER (SOC)
Available in days
days after you enroll
  Wrap up
Available in days
days after you enroll

Cyber Defense Lab


Our lab environment closely mirrors the real-world business environment where students get to play the role of a cyber security professional.

Unique Cyber Security Challenges!


Solve real world cyber security challenges by following structured incident response steps

Choose a Pricing Option


$199

Cyber Defense Enthusiast

Gain rudimentary understanding of cyber security, common cyber attack vectors

₦93,500

Cyber Defense Enthusiast - NG

Gain rudimentary understanding of cyber security, common cyber attack vectors