This course is the study of advanced security processes based on a security policy, emphasizing hands-on skills in the areas of secure perimeter, security connectivity, security management, identity services, and intrusion detection. The course prepares students to install/configure secure firewalls. ...and SIEM, SOARs (cyber infrastructures) with Powershell scripting.
Learning Objectives
Understand vulnerability response, handling, and management
Explore threat intelligence and threat hunting concepts
Explain important system and network architecture concepts
Understand process improvement in security operations
Implement vulnerability scanning methods
Perform vulnerability analysis
Classify vulnerability information
Explain incident response activities.
Demonstrate incident response communication
Apply tools to identify malicious activity
Analyze potentially malicious activity
Understand application vulnerability assessment
Explore scripting tools and analysis concepts
Understand application security and attack mitigation best practices
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.