• Classroom
  • Online, Instructor-Led

Learning Objectives

LESSON 1: UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT

Topic 1A: Understanding Cybersecurity Leadership Concepts
Topic 1B: Exploring Control Types and Methods
Topic 1C: Explaining Patch Management Concepts

LESSON 2: EXPLORING THREAT INTELLIGENCE AND THREAT HUNTING CONCEPTS

Topic 2A: Exploring Threat Actor Concepts
Topic 2B: Identifying Active Threats
Topic 2C: Exploring Threat-Hunting Concepts

LESSON 3: EXPLAINING IMPORTANT SYSTEM AND NETWORK ARCHITECTURE CONCEPTS

Topic 3A: Reviewing System and Network Architecture Concepts
Topic 3B: Exploring Identity and Access Management (IAM)
Topic 3C: Maintaining Operational Visibility

LESSON 4: UNDERSTANDING PROCESS IMPROVEMENT IN SECURITY OPERATIONS

Topic 4A: Exploring Leadership in Security Operations
Topic 4B: Understanding Technology for Security Operations

LESSON 5: IMPLEMENTING VULNERABILITY SCANNING METHODS

Topic 5A: Explaining Compliance Requirements
Topic 5B: Understanding Vulnerability Scanning Methods
Topic 5C: Exploring Special Considerations in Vulnerability Scanning

LESSON 6: PERFORMING VULNERABILITY ANALYSIS

Topic 6A: Understanding Vulnerability Scoring Concepts
Topic 6B: Exploring Vulnerability Context Considerations

LESSON 7: COMMUNICATING VULNERABILITY INFORMATION

Topic 7A: Explaining Effective Communication Concepts
Topic 7B: Understanding Vulnerability Reporting Outcomes and Action Plans

LESSON 8: EXPLAINING INCIDENT RESPONSE ACTIVITIES

Topic 8A: Exploring Incident Response Planning
Topic 8B: Performing Incident Response Activities

LESSON 9: DEMONSTRATING INCIDENT RESPONSE COMMUNICATION

Topic 9A: Understanding Incident Response Communication
Topic 9B: Analyzing Incident Response Activities

LESSON 10: APPLYING TOOLS TO IDENTIFY MALICIOUS ACTIVITY

Topic 10A: Identifying Malicious Activity
Topic 10B: Explaining Attack Methodology Frameworks
Topic 10C: Explaining Techniques for Identifying Malicious Activity

LESSON 11: ANALYZING POTENTIALLY MALICIOUS ACTIVITY

Topic 11A: Exploring Network Attack Indicators
Topic 11B: Exploring Host Attack Indicators
Topic 11C: Exploring Vulnerability Assessment Tools

LESSON 12: UNDERSTANDING APPLICATION VULNERABILITY ASSESSMENT

Topic 12A: Analyzing Web Vulnerabilities
Topic 12B: Analyzing Cloud Vulnerabilities

LESSON 13: EXPLORING SCRIPTING TOOLS AND ANALYSIS CONCEPTS

Topic 13A: Understanding Scripting Languages
Topic 13B: Identifying Malicious Activity Through Analysis

LESSON 14: UNDERSTANDING APPLICATION SECURITY AND ATTACK MITIGATION BEST PRACTICES

Topic 14A: Exploring Secure Software Development Practices
Topic 14B: Recommending Controls to Mitigate Successful Application Attacks
Topic 14C: Implementing Controls to Prevent Attacks

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):