This course introduces a comprehensive set of tools and tactics designed to manage cybersecurity risks effectively. It covers the identification of various common threats, the evaluation of organizational security measures, the collection and analysis of cybersecurity intelligence, and the proper handling of incidents as they arise.
Upon completing the course, participants will be proficient in the following:
- Assessing information security risk in computing and network environments.
- Analyzing reconnaissance threats to computing and network environments.
- Analyzing attacks on computing and network environments.
- Analyzing post-attack techniques on computing and network environments.
- Implementing a vulnerability management program.
- Collecting cybersecurity intelligence.
- Analyzing data collected from security and event logs.
- Performing active analysis on assets and networks.
- Responding effectively to cybersecurity incidents.
- Investigating cybersecurity incidents.
- Addressing security issues within the organization’s technology architecture.
These objectives ensure a comprehensive skill set in managing and responding to various aspects of cybersecurity within computing and network environments.
This course is primarily tailored for cybersecurity practitioners engaged in roles that involve safeguarding information systems to guarantee availability, integrity, authentication, confidentiality, and non-repudiation. Emphasizing the knowledge, abilities, and skills crucial for defending information systems in a cybersecurity framework, the course covers protection, detection, analysis, investigation, and response processes. Furthermore, it ensures that all members of an IT team, ranging from help desk staff to the Chief Information Officer, comprehend their respective roles within these security processes.