Getting into the deeper concepts of network defense require security researchers to get their hands a little dirty. By tearing apart malware after executing it, students will gain an appreciation for the inner workings of not just the motive of cyber attackers, but their TTPs as well. This course will use adversary emulation to push the capabilities of the students defense mechanisms to break them down, but for the purpose of building them back stronger.
Shadowscape
802 W. Bannock St.
Suite 1005
Boise, ID 83702
NET-I or equivalent is strongly recommended
This course will build upon the foundational principles of network and security fundamentals and provide actionable steps towards implementing IDS/IPS systems, log collection and analysis solutions (i.e.: SIEMs), network forensics, vulnerability scanning, introductory malware analysis and much more. This course seeks to guide students through hands-on, practical application in lieu of simulated, but real-world type attacks, giving them the ability to hone their detection capabilities and TTPs. By cultivating the ability to rapidly deploy defensive measures in the face of a potential attackers, "blue teamers" can harden their network defense mechanisms, taking the advantage away from the attacker.
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.