National CAE Designated Institution
  • Classroom
  • Online, Instructor-Led
Course Description

This course focuses on the fundamentals and the application of threat intelligence to cybersecurity.

Learning Objectives

 

  • Identify basic risk management processes
  • Demonstrate the ability to recognize cyber threats and vulnerabilities
  • Demonstrate the ability to apply incident response and handling methodologies
  • Demonstrate an understanding of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy
  • Understand Insider Threat investigations, reporting, investigative tools and laws/regulations
  • Understand adversarial tactics, techniques, and procedures.
  • Apply knowledge of current and emerging threats/threat vectors
  • Understand risk/threat assessment.
  • Understand cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Understand intrusion detection and signature development
  • Understand target or cyber threat actors and procedures
  • Perform packet-level analysis using appropriate tools
  • Apply incident handling methodologies.
  • Perform a log review in identifying evidence of past intrusions.
  • Utilize security event correlation tools.
  • Identify cyber threats which may jeopardize organization and/or partner interests
  • Respond and take local actions in response to threat sharing alerts from service providers.

 

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Operations
  • Digital Forensics
  • Exploitation Analysis
  • Incident Response
  • Legal Advice and Advocacy
  • Targets
  • Threat Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.