• Online, Instructor-Led
Course Description

In this course, you will learn how to research threat actors and create threat profiles. You will learn how to install and configure Docker and how to perform OSINT on a target. You will also learn about risk and gain an introduction to vulnerabilities and secure coding.

Learning Objectives

• At the end of this course, you will be able to analyze OSINT and SOCMINT collected on a target individual.
• At the end of this course, you will be able to set up and configure containers using Docker.
• At the end of this course, you will be able to build a threat actor profile using the Mitre Att&ck tool.
• At the end of this course, you will be able to perform a phishing attack.
• At the end of this course, you will be able to work in a team to analyze ethical cybersecurity situations
• At the end of this course, you will be able to identify the types of data within an organization, label the data, and prioritize what data is critical for the organization.
• At the end of this course, you will be able to analyze past data breaches to identify their impact.
• At the end of this course, you will be able to create a budget adjustment request presentation for a board of directors.
• At the end of this course, you will be able to deliver an effective presentation to a board of directors.
• At the end of this course, you will be able to research and analyze common cybersecurity industry reports (Ponemon Cost of a Data Breach Report and Verizon DBIR Report).
• Given a cybersecurity threat intelligence report, you will be able to identify the associated threat actors and identify TTPs using Mitre Att&ck.
• At the end of this course, you will have knowledge of the risk management framework (RMF).
• At the end of this course, you will have knowledge of applicable laws, regulations, policies, and ethics as they relate to cybersecurity.
• At the end of this course, you will have knowledge of cybersecurity and privacy principles.
• At the end of this course, you will have knowledge of the impacts to business operations from cybersecurity lapses.
• At the end of this course, you will have knowledge of CIA (confidentiality, integrity, and availability) requirements for an organization.
• At the end of this course, you will have knowledge of defense in depth best practices.
• At the end of this course, you will have knowledge on the impact to data and services from cyber attacks.
• At the end of this course, you will be able to build a security roadmap for a company.
• At the end of this course, you will have knowledge of vulnerabilities.
• At the end of this course, you will be able to scan and enumerate a target system using nmap.
• At the end of this course, you will have knowledge of secure coding.

Framework Connections