This 1-day Instructor-led security workshop provides insight into security practices to improve the security posture of an organization.
Learning Objectives
Describe the current cybersecurity landscape
Describe the assume compromise philosophy
Identify factors that contribute to the cost of a breach
Distinguish between responsibilities of red teams and blue teams
Identify typical objectives of cyber attackers
Describe a kill chain carried out by read teams
Describe the role, goals, and kill chain activities of the blue team in red team exercises
Describe the ways limiting how an attacker can compromise unprivileged accounts.
Describe the methods used to restrict lateral movement.
Describe how telemetry monitoring is used to detect attacks.
Explain the concept of Confidentiality, Integrity, and Availability (CIA) triad.
Describe the primary activities that should be included in organization preparations
Identify the main principles of developing and maintaining policies.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Knowledge Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@hq.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.