In this course, you will learn how to research threat actors and create threat profiles. You will learn how to install and configure Docker and how to perform OSINT on a target. You will also learn about risk and gain an introduction to vulnerabilities and secure coding.
Learning Objectives
• At the end of this course, you will be able to analyze OSINT and SOCMINT collected on a target individual.
• At the end of this course, you will be able to set up and configure containers using Docker.
• At the end of this course, you will be able to build a threat actor profile using the Mitre Att&ck tool.
• At the end of this course, you will be able to perform a phishing attack.
• At the end of this course, you will be able to work in a team to analyze ethical cybersecurity situations
• At the end of this course, you will be able to identify the types of data within an organization, label the data, and prioritize what data is critical for the organization.
• At the end of this course, you will be able to analyze past data breaches to identify their impact.
• At the end of this course, you will be able to create a budget adjustment request presentation for a board of directors.
• At the end of this course, you will be able to deliver an effective presentation to a board of directors.
• At the end of this course, you will be able to research and analyze common cybersecurity industry reports (Ponemon Cost of a Data Breach Report and Verizon DBIR Report).
• Given a cybersecurity threat intelligence report, you will be able to identify the associated threat actors and identify TTPs using Mitre Att&ck.
• At the end of this course, you will have knowledge of the risk management framework (RMF).
• At the end of this course, you will have knowledge of applicable laws, regulations, policies, and ethics as they relate to cybersecurity.
• At the end of this course, you will have knowledge of cybersecurity and privacy principles.
• At the end of this course, you will have knowledge of the impacts to business operations from cybersecurity lapses.
• At the end of this course, you will have knowledge of CIA (confidentiality, integrity, and availability) requirements for an organization.
• At the end of this course, you will have knowledge of defense in depth best practices.
• At the end of this course, you will have knowledge on the impact to data and services from cyber attacks.
• At the end of this course, you will be able to build a security roadmap for a company.
• At the end of this course, you will have knowledge of vulnerabilities.
• At the end of this course, you will be able to scan and enumerate a target system using nmap.
• At the end of this course, you will have knowledge of secure coding.