Course Summary

Enterprises today face the ongoing challenge of escalating adversary activity, resulting in frequent attacks and, ultimately, data loss and leakage. To effectively address these threats, organizations need cross-trained professionals who are fully prepared to contribute to CERT/CSIRT activities when needed. This course is designed for experienced technologists exploring cyber career paths and seeking hands-on experience with cutting-edge tools. This unique course covers a wide range of cybersecurity sub-disciplines, providing training in the tools and techniques used daily to defend enterprises.

The full-day course spans key topics, including defending network architecture, penetration testing, security operations, DFIR/CERT/CSIRT, and malware analysis. Participants will gain hands-on experience with real-world tools (such as Cisco routers, Covenant, Metasploit, Nessus, Nmap, Procmon, Snort, SOF-ELK, TShark, Wireshark, and more) in 25 in-class labs, demonstrating:

Active defense strategies
Attacks against network devices and corresponding defenses
Digital artifact collection
Forensic data recovery
Interactive malware behavioral analysis
Intrusion detection and Snort signature creation
Log aggregation and correlation
Manual code reverse engineering
Network forensics
Network scanning and enumeration
Packet and protocol analysis
Password cracking techniques
Super timeline analysis
System exploitation and post-exploitation pivoting
Vulnerability assessment
Web application scanning and attacks

Defending Network Protocols
You will learn about commonly used network protocols and methods to defend against protocol-based attacks. You will also gain knowledge of audit techniques, as well as the Center for Internet Security’s benchmarks and Critical Security Controls.

Defensive Infrastructure and Tactics
You will gain foundational knowledge of defensive measures for both network and cloud-based infrastructures, including common detective and preventive controls.

Digital Forensics Concepts and Application
You will learn digital forensics methodologies and develop proficiency in identifying forensic artifacts.

Incident Response Concepts and Application
You will understand the continuous incident response process, how it integrates with threat intelligence practices, and its relationship to the Cyber Kill Chain.

Interactive and Manual Malware Analysis
You will gain expertise in interactive malware behavior analysis, including using analysis tools and interpreting results. You will also learn manual malware code reversal, disassembly, decompiling, and techniques used to obfuscate malware code.

Intrusion Detection and Packet Analysis
You will learn about intrusion prevention systems, their placement, configuration, and tuning within the enterprise, and gain proficiency in responding to intrusion alerts.

Malware Analysis Concepts and Basic Techniques
You will understand various types of malware, the symptoms of infection, and methods to analyze malware safely. You will also learn about automated and static malware analysis techniques and how to interpret the results.

Network Forensics, Logging, and Event Management
You will learn how to use logs and flow data in network forensics, understand the importance of logging and event management in security operations, and how to utilize SIEM and security analytics tools effectively.

Network Security Monitoring Concepts and Application
You will gain knowledge of the devices used in SOCs to monitor networks, packet types, packet capture tools, and the practice of continuous network monitoring, including advanced issues like monitoring encrypted traffic.

Penetration Testing Application
You will learn to apply penetration testing tactics and tools to typical penetration test targets.

Penetration Testing Concepts
You will understand the scoping, rules of engagement, tools, and tactics used in penetration testing, as well as how to report findings to the intended audience.

There are no formal prerequisites for this course

proctored exam 115 questions 3 hours Minimum passing score of 69%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?