This course is the study of advanced security processes based on a security policy, emphasizing hands-on skills in the areas of secure perimeter, security connectivity, security management, identity services, and intrusion detection. The course prepares students to install/configure secure firewalls. ...and SIEM, SOARs (cyber infrastructures) with Powershell scripting.
Understand vulnerability response, handling, and management
Explore threat intelligence and threat hunting concepts
Explain important system and network architecture concepts
Understand process improvement in security operations
Implement vulnerability scanning methods
Perform vulnerability analysis
Classify vulnerability information
Explain incident response activities.
Demonstrate incident response communication
Apply tools to identify malicious activity
Analyze potentially malicious activity
Understand application vulnerability assessment
Explore scripting tools and analysis concepts
Understand application security and attack mitigation best practices