Course objectives
After completing this course, students will be able to:
- Detect and analyze indicators of malicious activity
- Understand threat hunting and threat intelligence concepts
- Use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities
- Perform incident response processes
- Understand reporting and communication concepts related to vulnerability management and incident response activities
Course outlines
- UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT
- EXPLORING THREAT INTELLIGENCE AND THREAT HUNTING CONCEPTS
- EXPLAINING IMPORTANT SYSTEM AND NETWORK ARCHITECTURE CONCEPTS
- UNDERSTANDING PROCESS IMPROVEMENT IN SECURITY OPERATIONS
- IMPLEMENTING VULNERABILITY SCANNING METHODS
- PERFORMING VULNERABILITY ANALYSIS
- COMMUNICATING VULNERABILITY INFORMATION
- EXPLAINING INCIDENT RESPONSE ACTIVITIES
- DEMONSTRATING INCIDENT RESPONSE COMMUNICATION
- APPLYING TOOLS TO IDENTIFY MALICIOUS ACTIVITY
- ANALYZING POTENTIALLY MALICIOUS ACTIVITY
- UNDERSTANDING APPLICATION VULNERABILITY ASSESSMENT
- EXPLORING SCRIPTING TOOLS AND ANALYSIS CONCEPTS
- UNDERSTANDING APPLICATION SECURITY AND ATTACK MITIGATION BEST PRACTICES