Wij slaan cookies op om onze website te verbeteren. Is dat akkoord? Ja Nee Meer over cookies »
Artikelnummer: 118013811

Security Threat Intelligence Training

Artikelnummer: 118013811

Security Threat Intelligence Training

298,00 360,58 Incl. btw

Security Threat Intelligence E-Learning Training Gecertificeerde docenten Quizzen Assessments test examen Live Labs Tips trucs Certificaat.

Lees meer
Beschikbaarheid:
Op voorraad
Levertijd:
Voor 17:00 uur besteld! Start vandaag. Gratis Verzending.
  • Award Winning E-learning
  • De laagste prijs garantie
  • Persoonlijke service van ons deskundige team
  • Betaal veilig online of op factuur
  • Bestel en start binnen 24 uur

Security Threat Intelligence E-Learning Training

Welkom bij de Security Threat Intelligence Learning Kit, waarin u zult ontdekken hoe u een organisatie kunt beschermen tegen zowel externe als interne bedreigingen met behulp van processen en tools om informatie te verzamelen en te analyseren.
De nadruk ligt op beveiligingsprogrammering, malwareverwijdering, netwerkonderzoek en -extracties, defensieve CyberOps, netwerk- en hostanalyse, forensische analyse en best practices voor bedreigingsinformatie en attributie.

Learning Kits zijn gestructureerde leertrajecten, voornamelijk binnen het gebied Emerging Tech. Een Learning Kit de student naar een overkoepelend doel toe en helpt hem om zijn loopbaanaspiraties te verwezenlijken. Elk deel neemt de student stap voor stap mee door een gevarieerd aantal onderwerpen. Leerpakketten zijn samengesteld uit verplichte tracks, die alle beschikbare leermiddelen bevatten, zoals beoordelingen (eindexamens), mentor, oefenlabs en natuurlijk E-learning. En alle bronnen zijn 365 dagen toegankelijk vanaf de eerste activering.

Deze Learning Kit met meer dan 23 leeruren is verdeeld in drie sporen:

Cursusinhoud

E-learning courses (22 hours +)

CyberOps: Introduction to CyberOps

Course: 54 Minutes

  • Course Overview
  • Introduction to Defensive Cyber Operations
  • Introduction to Offensive Cyber Operations
  • Using Nessus to Perform a Vulnerability Scan
  • Using Metasploit to Attack Systems
  • Comparing OCO with DCO Operations
  • Introducing the Cyber Operations Cycle
  • Phases of the Cyber Operations Cycle
  • Offensive Team Roles
  • Defensive Team Roles
  • Supporting Team Roles
  • Course Summary

Security Programming: Command Line Essentials

Course: 58 Minutes

  • Course Overview
  • Command Line Properties
  • Bash Properties
  • PowerShell Environment
  • Text Editing Basics
  • Text Processing
  • Bash History
  • Process Management
  • Scheduled Jobs
  • File Monitoring
  • File Comparison
  • Redirecting Input and Output
  • Package Management
  • Course Summary

Security Programming: Code Identification

Course: 1 Hour, 9 Minutes

  • Course Overview
  • Coding Paradigms
  • Identifying Bash Scripts
  • Identifying Python Scripts
  • Identifying C programs
  • Identifying C++ programs
  • Identifying C# programs
  • Identifying Regular Expressions
  • Identifying PowerShell Scripts
  • Identifying SQL Code
  • Common Code Vulnerabilities
  • Identifying Binary Files
  • Verifying Downloaded Files
  • Course Summary

Security Programming: Scripting Essentials

Course: 1 Hour, 1 Minute

  • Course Overview
  • Introduction to Scripting
  • Bash Variables
  • Bash Conditionals
  • Bash Loops
  • Bash Functions
  • Python Variables
  • Python Conditionals
  • Python Loops
  • Python Functions
  • Python Imports
  • Python File Operations
  • Python Web Requests
  • Course Summary

Security Programming: System Essentials

Course: 57 Minutes

  • Course Overview
  • Remote Shell Access
  • User Accounts
  • IP Routing
  • Network Interfaces
  • Domain Names
  • Log Files
  • Process Reporting
  • Disk Use
  • User Activity
  • System Activity
  • Time and Date Services
  • /etc Configurations
  • Course Summary

Malware Removal: Identifying Malware Types & Classification Approaches

Course: 26 Minutes

  • Course Overview
  • Introduction to Traditional Malware Types
  • Understanding Worm and Trojan Viruses
  • Identifying Rootkits, Botnets, and Ransomware
  • Understanding Malware Symptoms
  • Tools to Fight Against Malware
  • Classifying the Severity of Malware
  • Course Summary

Malware Removal: Analyzing an Infected System

Course: 1 Hour, 45 Minutes

  • Course Overview
  • Why Analyze Malware
  • Introduction to Static Analysis
  • Introduction to Dynamic Analysis
  • Malware Characteristics
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Malware Impacts
  • Ports and Processes Used By Malware
  • Process Monitor
  • Wireshark
  • Malicious Code and Program Flow
  • Course Summary

Malware Removal: Remediate an Infected System

Course: 50 Minutes

  • Course Overview
  • Symptoms of an Infected System
  • Best Practices for Malware Removal
  • Remediation Approaches for Malware
  • Windows Malicious Software Removal Tool
  • Using Restore Points
  • Using Windows Repair Tools with Restore Points
  • Restoring a System Backup
  • Comparing Virus Removal to Complete Re-install
  • Viruses Affecting your Boot Environment
  • Using Windows Repair Tools to Solve Boot Issues
  • Course Summary

Malware Removal: Reporting Findings & Preventing Future Infections

Course: 31 Minutes

  • Course Overview
  • Responding to Malware Incidents
  • Reporting Malware Incidents
  • Preventing Future Malware Incidents
  • Planning For Recovery
  • Creating a System Image
  • Course Summary

Network Survey & Extraction: Network Analysis

Course: 58 Minutes

  • Course Overview
  • Network Scanning Tools
  • Identifying Network Vulnerabilities
  • Alternative Network Vulnerabilities
  • Efficient Network Scanning
  • Reverse IP Lookup
  • Identifying Services
  • Operating System Identification
  • UDP Scanning
  • Stealth Scanning
  • Connect Scanning
  • Zombie Scanning
  • ARP Scanning
  • Course Summary

Network Survey & Extraction: Network Monitoring

Course: 52 Minutes

  • Course Overview
  • Actively Monitoring Services
  • Managing Collected Data
  • Vulnerability Metrics
  • Network Reporting and Record Keeping
  • DNS Host Discovery
  • Netcat Banner Grabbing
  • Tcpdump Connection Filtering
  • Tcpdump Protocol Filtering
  • Gathering Site Reports
  • Firewall Scanning
  • SSL/TLS Scanning
  • SMTP Scanning
  • Course Summary

Defensive CyberOps: Defensive Cyberspace Operations

Course: 43 Minutes

  • Course Overview
  • Principles of Defensive Cyber Operations
  • DCO Measures and Response
  • DCO and Cybersecurity
  • DCO Maneuver Operations
  • DCO Analytics
  • DCO Missions
  • DCO Operating Domains
  • DCO Mission Owner
  • DCO Network Owner
  • DCO Planning Considerations
  • DCO Threat Detection and Characterization
  • DCO Tools and Capabilities
  • Course Summary

Network & Host Analysis: Protocol Analysis

Course: 58 Minutes

  • Course Overview
  • Network Data Pattern Analysis
  • The Open Systems Interconnection (OSI) Model
  • Passive and Active Scanning Approches
  • Capturing Traffic Using Wireshark
  • Filtering Traffic Using Wireshark
  • Customizing Packet Capturing in Wireshark
  • Saving and Exporting Captures in Wireshark
  • Highlighting Rules Using Wireshark
  • Extracting Files Using Wireshark
  • Configuring Profiles in Wireshark
  • Controlling Filter Display in Wireshark
  • Implementing Advanced Filtering in Wireshark
  • Course Summary

Network & Host Analysis: Network Protocols

Course: 1 Hour

  • Course Overview
  • Filtering DNS Traffic
  • Filtering TCP Traffic
  • Filtering UDP Traffic
  • Capturing ICMP Traffic
  • Examining HTTP Traffic
  • Inspecting SSH Traffic
  • Extracting FTP Traffic
  • Filtering Email Traffic
  • Capturing ARP Traffic
  • Capturing DHCP Traffic
  • Monitoring Telnet Sessions
  • Filtering IPv6 Traffic
  • Course Summary

Network & Host Analysis: Network Observations

Course: 1 Hour

  • Course Overview
  • Displaying Protocol Hierarchies in Wireshark
  • Identifying Endpoints Using Wireshark
  • Visualizing Networks
  • Visualizing Networks in Visio
  • Assessing Networks
  • Developing Baselines
  • Baselining in Wireshark
  • Wireshark Capture Engines
  • Creating Rules in Wireshark
  • Detecting Scans Using Wireshark
  • Tunneling Remotely Using Wireshark
  • Course Summary

Network & Host Analysis: Network Analysis Formats

Course: 1 Hour

  • Course Overview
  • NetFlow and IPFIX Collection
  • NetFlow and Baselining
  • The Benefit of Audit Logs
  • Application Access Control
  • Tapping Network Traffic
  • Emitting and Aggregating Logs
  • Queueing Events
  • Network Management with SNMP
  • Packet Capturing with PCAP
  • Whitelisting Applications
  • Using Wireshark for Event Detection
  • Importing and Exporting PCAP
  • Course Summary

Network & Host Analysis: Network Operations

Course: 1 Hour, 1 Minute

  • Course Overview
  • Network Defense Tools
  • Implementing NSM
  • SIEM for Threat Activity
  • Installing Suricata
  • Applying Suricata Rules
  • Creating Suricata Alerts
  • Generating Suricata Logs
  • Installing ELK Stack Prerequisites
  • Installing ELK Stack
  • Integrating Suricata and ELK Stack
  • Navigating Kibana for SIEM
  • Integrating Suricata and Wireshark
  • Course Summary

Forensic Analysis: Cybercrime Investigations

Course: 1 Hour, 38 Minutes

  • Course Overview
  • Packet Captures
  • Network Forensics
  • Capturing Network Traffic
  • Working With PCAP Files
  • Volatile Data
  • Memory Forensics Tools
  • Using the Volatility Framework
  • Windows Registry
  • Locating Evidence Within the Registry
  • Registry Analysis Tools
  • Categories of Digital Evidence
  • Gathering Digital Evidence
  • Computer Forensic Analysis Tools
  • SANS Investigative Forensic Toolkit (SIFT)
  • Analyzing Evidence Using SIFT
  • Course Summary

CyberOps Windows Hardening: Windows Server Hardening Best Practices

Course: 1 Hour, 33 Minutes

  • Course Overview
  • BIOS/UEFI Settings to Improve Workstation Security
  • Hardening User Accounts on a Windows Workstation
  • Implementing AppLocker Policies on Windows
  • Hardening Windows Services and Removing Software
  • Patching Windows Systems
  • Implementing a Windows Workstation Password Policy
  • Implementing a Windows Account Lockout Policy
  • Configuring Windows User Rights
  • Implementing Full Disk Encryption with BitLocker
  • Encrypting USB Drives with BitLocker To Go
  • Using Windows Defender as an Antivirus Tool
  • Configuring Auditing on a Windows Workstation
  • Using Security Templates on a Windows Workstation
  • Course Summary

CyberOps Windows Hardening: Windows Workstation Hardening Best Practices

Course: 1 Hour, 30 Minutes

  • Course Overview
  • BIOS/UEFI Settings to Improve Workstation Security
  • Hardening User Accounts on a Windows Workstation
  • Implementing AppLocker Policies on Windows
  • Hardening Windows Services and Removing Software
  • Patching Windows Systems
  • Implementing a Windows Workstation Password Policy
  • Implementing a Windows Account Lockout Policy
  • Configuring Windows User Rights
  • Implementing Full Disk Encryption with BitLocker
  • Encrypting USB Drives with BitLocker To Go
  • Using Windows Defender as an Antivirus Tool
  • Configuring Auditing on a Windows Workstation
  • Using Security Templates on a Windows Workstation
  • Course Summary

Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts

Course: 1 Hour, 40 Minutes

  • Course Overview
  • Threat Intelligence
  • Key Elements of Threat Intelligence
  • The Value of Threat Intelligence
  • Using Threat Intelligence
  • Cyber Threat Actors
  • Common Indicators of Compromise
  • Intelligence versus Data versus Information
  • Threat Intelligence Lifecycle
  • Strategic Threat Intelligence
  • Tactical Threat Intelligence
  • Operational Threat Intelligence
  • Technical Threat Intelligence
  • Machine Learning and Threat Intelligence
  • Risk Modeling and Threat Intelligence
  • Threat Intelligence Use Cases
  • The Threat Landscape
  • Intrusion Detection and Analysis
  • Threat Intelligence Sources
  • Course Summary

Assessment: Security Threat Intelligence

Will test your knowledge and application of the topics presented throughout the Security Threat Intelligence courses.

Practice Lab: Security Threat Intelligence (estimated duration: 8 hours)

Perform security threat intelligence tasks such as scanning networks, connecting to remote hosts, scanning websites for vulnerabilities, and using Wireshark to save packet captures. Then perform packet filtering, program verification, scripting and test a service for weaknesses or vulnerabilities.

Levertijd Binnen 1 werkdag
Online toegang 365 dagen
Lesduur 23 uur
Studiebelasting Variabel i.v.m. praktijkopdrachten.
Leermethoden Instructie video, Demonstratie video, Knowledge Base
Besturingssystemen Microsoft Windows, Google Chrome OS, Apple MacOS
Inbegrepen dienstverlening Contact met docent per mail en chat, Voortgangsrapportage, 24/7 online toegang
Ondersteunde browsers Internet Explorer, Edge, Firefox, Safari en Chrome
MOS Examen Mogelijk voor bijbehorend examennummer
Toegang tot docent Per mail en chat
Extra Opties Virtual Labs (indien beschikbaar)
Aanschaf Eenmalig bedrag

Er zijn nog geen reviews geschreven over dit product.

Loading...

OEM Office Elearning Menu Genomineerd voor 'Beste Opleider van Nederland'

OEM Office Elearning Menu is trots genomineerd te zijn voor de titel 'Beste Opleider van Nederland' door Springest, een onderdeel van Archipel. Deze erkenning bevestigt onze kwaliteit en toewijding. Hartelijk dank aan al onze cursisten.

Beoordelingen

Er zijn nog geen reviews geschreven over dit product.

25.000+

Deelnemers getrained

Springest: 9.1 - Edubookers 8.9

Gemiddeld cijfer

3500+

Aantal getrainde bedrijven

20+

Jaren ervaring

Nóg meer kennis

Lees onze meest recente blogartikelen

Bekijk alles