Course Overview
Learning Objectives
LESSON 1: UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT
Topic 1A: Understanding Cybersecurity Leadership Concepts
Topic 1B: Exploring Control Types and Methods
Topic 1C: Explaining Patch Management Concepts
LESSON 2: EXPLORING THREAT INTELLIGENCE AND THREAT HUNTING CONCEPTS
Topic 2A: Exploring Threat Actor Concepts
Topic 2B: Identifying Active Threats
Topic 2C: Exploring Threat-Hunting Concepts
LESSON 3: EXPLAINING IMPORTANT SYSTEM AND NETWORK ARCHITECTURE CONCEPTS
Topic 3A: Reviewing System and Network Architecture Concepts
Topic 3B: Exploring Identity and Access Management (IAM)
Topic 3C: Maintaining Operational Visibility
LESSON 4: UNDERSTANDING PROCESS IMPROVEMENT IN SECURITY OPERATIONS
Topic 4A: Exploring Leadership in Security Operations
Topic 4B: Understanding Technology for Security Operations
LESSON 5: IMPLEMENTING VULNERABILITY SCANNING METHODS
Topic 5A: Explaining Compliance Requirements
Topic 5B: Understanding Vulnerability Scanning Methods
Topic 5C: Exploring Special Considerations in Vulnerability Scanning
LESSON 6: PERFORMING VULNERABILITY ANALYSIS
Topic 6A: Understanding Vulnerability Scoring Concepts
Topic 6B: Exploring Vulnerability Context Considerations
LESSON 7: COMMUNICATING VULNERABILITY INFORMATION
Topic 7A: Explaining Effective Communication Concepts
Topic 7B: Understanding Vulnerability Reporting Outcomes and Action Plans
LESSON 8: EXPLAINING INCIDENT RESPONSE ACTIVITIES
Topic 8A: Exploring Incident Response Planning
Topic 8B: Performing Incident Response Activities
LESSON 9: DEMONSTRATING INCIDENT RESPONSE COMMUNICATION
Topic 9A: Understanding Incident Response Communication
Topic 9B: Analyzing Incident Response Activities
LESSON 10: APPLYING TOOLS TO IDENTIFY MALICIOUS ACTIVITY
Topic 10A: Identifying Malicious Activity
Topic 10B: Explaining Attack Methodology Frameworks
Topic 10C: Explaining Techniques for Identifying Malicious Activity
LESSON 11: ANALYZING POTENTIALLY MALICIOUS ACTIVITY
Topic 11A: Exploring Network Attack Indicators
Topic 11B: Exploring Host Attack Indicators
Topic 11C: Exploring Vulnerability Assessment Tools
LESSON 12: UNDERSTANDING APPLICATION VULNERABILITY ASSESSMENT
Topic 12A: Analyzing Web Vulnerabilities
Topic 12B: Analyzing Cloud Vulnerabilities
LESSON 13: EXPLORING SCRIPTING TOOLS AND ANALYSIS CONCEPTS
Topic 13A: Understanding Scripting Languages
Topic 13B: Identifying Malicious Activity Through Analysis
LESSON 14: UNDERSTANDING APPLICATION SECURITY AND ATTACK MITIGATION BEST PRACTICES
Topic 14A: Exploring Secure Software Development Practices
Topic 14B: Recommending Controls to Mitigate Successful Application Attacks
Topic 14C: Implementing Controls to Prevent Attacks
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):