Security Threat Intelligence - Threat intelligence

Type product

Security Threat Intelligence - Threat intelligence

OEM ICT Trainingen & Advies
Logo van OEM ICT Trainingen & Advies
Opleiderscore: starstarstarstarstar_half 9,0 OEM ICT Trainingen & Advies heeft een gemiddelde beoordeling van 9,0 (uit 218 ervaringen)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Beschrijving

Security Threat Intelligence

Welcome to the Security Threat Intelligence Learning Kit, where you will discover how to protect an organisation from both external and internal threats using intelligence gathering and analysis processes and tools.
The focus is on security programming, malware removal, network investigation and extraction, defensive CyberOps, network and host analysis, forensic analysis and best practices for threat intelligence and attribution.

Package Includes

  • 12 Months Online Access featuring ondemand instructor-led classroom sessions with full audio and video lectures
  • Real Live Practice Lab
    Security Threat Intelligence (estimated duration: 8 hours)
    Perform security threa…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Threat intelligence, IT Beveiliging / Security, Cyber Security, Penetration testing en Ethical Hacking.

Security Threat Intelligence

Welcome to the Security Threat Intelligence Learning Kit, where you will discover how to protect an organisation from both external and internal threats using intelligence gathering and analysis processes and tools.
The focus is on security programming, malware removal, network investigation and extraction, defensive CyberOps, network and host analysis, forensic analysis and best practices for threat intelligence and attribution.

Package Includes

  • 12 Months Online Access featuring ondemand instructor-led classroom sessions with full audio and video lectures
  • Real Live Practice Lab
    Security Threat Intelligence (estimated duration: 8 hours)
    Perform security threat intelligence tasks such as scanning networks, connecting to remote hosts, scanning websites for vulnerabilities, and using Wireshark to save packet captures. Then perform packet filtering, program verification, scripting and test a service for weaknesses or vulnerabilities.
  • Assessment: Security Threat Intelligence

Hybrid Learning offers a unique blend of training materials, videos, and exercises that you can apply independently to your specific learning needs. As an IT professional, you will have 12 months of access to the online training materials, allowing you to review and practice the content multiple times. This flexible approach ensures that you can thoroughly prepare for the exam and keep your knowledge up-to-date.

Course content

E-learning courses (22 hours +)

CyberOps: Introduction to CyberOps

Course: 54 Minutes

  • Course Overview
  • Introduction to Defensive Cyber Operations
  • Introduction to Offensive Cyber Operations
  • Using Nessus to Perform a Vulnerability Scan
  • Using Metasploit to Attack Systems
  • Comparing OCO with DCO Operations
  • Introducing the Cyber Operations Cycle
  • Phases of the Cyber Operations Cycle
  • Offensive Team Roles
  • Defensive Team Roles
  • Supporting Team Roles
  • Course Summary

Security Programming: Command Line Essentials

Course: 58 Minutes

  • Course Overview
  • Command Line Properties
  • Bash Properties
  • PowerShell Environment
  • Text Editing Basics
  • Text Processing
  • Bash History
  • Process Management
  • Scheduled Jobs
  • File Monitoring
  • File Comparison
  • Redirecting Input and Output
  • Package Management
  • Course Summary

Security Programming: Code Identification

Course: 1 Hour, 9 Minutes

  • Course Overview
  • Coding Paradigms
  • Identifying Bash Scripts
  • Identifying Python Scripts
  • Identifying C programs
  • Identifying C++ programs
  • Identifying C# programs
  • Identifying Regular Expressions
  • Identifying PowerShell Scripts
  • Identifying SQL Code
  • Common Code Vulnerabilities
  • Identifying Binary Files
  • Verifying Downloaded Files
  • Course Summary

Security Programming: Scripting Essentials

Course: 1 Hour, 1 Minute

  • Course Overview
  • Introduction to Scripting
  • Bash Variables
  • Bash Conditionals
  • Bash Loops
  • Bash Functions
  • Python Variables
  • Python Conditionals
  • Python Loops
  • Python Functions
  • Python Imports
  • Python File Operations
  • Python Web Requests
  • Course Summary

Security Programming: System Essentials

Course: 57 Minutes

  • Course Overview
  • Remote Shell Access
  • User Accounts
  • IP Routing
  • Network Interfaces
  • Domain Names
  • Log Files
  • Process Reporting
  • Disk Use
  • User Activity
  • System Activity
  • Time and Date Services
  • /etc Configurations
  • Course Summary

Malware Removal: Identifying Malware Types & Classification Approaches

Course: 26 Minutes

  • Course Overview
  • Introduction to Traditional Malware Types
  • Understanding Worm and Trojan Viruses
  • Identifying Rootkits, Botnets, and Ransomware
  • Understanding Malware Symptoms
  • Tools to Fight Against Malware
  • Classifying the Severity of Malware
  • Course Summary

Malware Removal: Analyzing an Infected System

Course: 1 Hour, 45 Minutes

  • Course Overview
  • Why Analyze Malware
  • Introduction to Static Analysis
  • Introduction to Dynamic Analysis
  • Malware Characteristics
  • Static Malware Analysis
  • Dynamic Malware Analysis
  • Malware Impacts
  • Ports and Processes Used By Malware
  • Process Monitor
  • Wireshark
  • Malicious Code and Program Flow
  • Course Summary

Malware Removal: Remediate an Infected System

Course: 50 Minutes

  • Course Overview
  • Symptoms of an Infected System
  • Best Practices for Malware Removal
  • Remediation Approaches for Malware
  • Windows Malicious Software Removal Tool
  • Using Restore Points
  • Using Windows Repair Tools with Restore Points
  • Restoring a System Backup
  • Comparing Virus Removal to Complete Re-install
  • Viruses Affecting your Boot Environment
  • Using Windows Repair Tools to Solve Boot Issues
  • Course Summary

Malware Removal: Reporting Findings & Preventing Future Infections

Course: 31 Minutes

  • Course Overview
  • Responding to Malware Incidents
  • Reporting Malware Incidents
  • Preventing Future Malware Incidents
  • Planning For Recovery
  • Creating a System Image
  • Course Summary

Network Survey & Extraction: Network Analysis

Course: 58 Minutes

  • Course Overview
  • Network Scanning Tools
  • Identifying Network Vulnerabilities
  • Alternative Network Vulnerabilities
  • Efficient Network Scanning
  • Reverse IP Lookup
  • Identifying Services
  • Operating System Identification
  • UDP Scanning
  • Stealth Scanning
  • Connect Scanning
  • Zombie Scanning
  • ARP Scanning
  • Course Summary

Network Survey & Extraction: Network Monitoring

Course: 52 Minutes

  • Course Overview
  • Actively Monitoring Services
  • Managing Collected Data
  • Vulnerability Metrics
  • Network Reporting and Record Keeping
  • DNS Host Discovery
  • Netcat Banner Grabbing
  • Tcpdump Connection Filtering
  • Tcpdump Protocol Filtering
  • Gathering Site Reports
  • Firewall Scanning
  • SSL/TLS Scanning
  • SMTP Scanning
  • Course Summary

Defensive CyberOps: Defensive Cyberspace Operations

Course: 43 Minutes

  • Course Overview
  • Principles of Defensive Cyber Operations
  • DCO Measures and Response
  • DCO and Cybersecurity
  • DCO Maneuver Operations
  • DCO Analytics
  • DCO Missions
  • DCO Operating Domains
  • DCO Mission Owner
  • DCO Network Owner
  • DCO Planning Considerations
  • DCO Threat Detection and Characterization
  • DCO Tools and Capabilities
  • Course Summary

Network & Host Analysis: Protocol Analysis

Course: 58 Minutes

  • Course Overview
  • Network Data Pattern Analysis
  • The Open Systems Interconnection (OSI) Model
  • Passive and Active Scanning Approches
  • Capturing Traffic Using Wireshark
  • Filtering Traffic Using Wireshark
  • Customizing Packet Capturing in Wireshark
  • Saving and Exporting Captures in Wireshark
  • Highlighting Rules Using Wireshark
  • Extracting Files Using Wireshark
  • Configuring Profiles in Wireshark
  • Controlling Filter Display in Wireshark
  • Implementing Advanced Filtering in Wireshark
  • Course Summary

Network & Host Analysis: Network Protocols

Course: 1 Hour

  • Course Overview
  • Filtering DNS Traffic
  • Filtering TCP Traffic
  • Filtering UDP Traffic
  • Capturing ICMP Traffic
  • Examining HTTP Traffic
  • Inspecting SSH Traffic
  • Extracting FTP Traffic
  • Filtering Email Traffic
  • Capturing ARP Traffic
  • Capturing DHCP Traffic
  • Monitoring Telnet Sessions
  • Filtering IPv6 Traffic
  • Course Summary

Network & Host Analysis: Network Observations

Course: 1 Hour

  • Course Overview
  • Displaying Protocol Hierarchies in Wireshark
  • Identifying Endpoints Using Wireshark
  • Visualizing Networks
  • Visualizing Networks in Visio
  • Assessing Networks
  • Developing Baselines
  • Baselining in Wireshark
  • Wireshark Capture Engines
  • Creating Rules in Wireshark
  • Detecting Scans Using Wireshark
  • Tunneling Remotely Using Wireshark
  • Course Summary

Network & Host Analysis: Network Analysis Formats

Course: 1 Hour

  • Course Overview
  • NetFlow and IPFIX Collection
  • NetFlow and Baselining
  • The Benefit of Audit Logs
  • Application Access Control
  • Tapping Network Traffic
  • Emitting and Aggregating Logs
  • Queueing Events
  • Network Management with SNMP
  • Packet Capturing with PCAP
  • Whitelisting Applications
  • Using Wireshark for Event Detection
  • Importing and Exporting PCAP
  • Course Summary

Network & Host Analysis: Network Operations

Course: 1 Hour, 1 Minute

  • Course Overview
  • Network Defense Tools
  • Implementing NSM
  • SIEM for Threat Activity
  • Installing Suricata
  • Applying Suricata Rules
  • Creating Suricata Alerts
  • Generating Suricata Logs
  • Installing ELK Stack Prerequisites
  • Installing ELK Stack
  • Integrating Suricata and ELK Stack
  • Navigating Kibana for SIEM
  • Integrating Suricata and Wireshark
  • Course Summary

Forensic Analysis: Cybercrime Investigations

Course: 1 Hour, 38 Minutes

  • Course Overview
  • Packet Captures
  • Network Forensics
  • Capturing Network Traffic
  • Working With PCAP Files
  • Volatile Data
  • Memory Forensics Tools
  • Using the Volatility Framework
  • Windows Registry
  • Locating Evidence Within the Registry
  • Registry Analysis Tools
  • Categories of Digital Evidence
  • Gathering Digital Evidence
  • Computer Forensic Analysis Tools
  • SANS Investigative Forensic Toolkit (SIFT)
  • Analyzing Evidence Using SIFT
  • Course Summary

CyberOps Windows Hardening: Windows Server Hardening Best Practices

Course: 1 Hour, 33 Minutes

  • Course Overview
  • BIOS/UEFI Settings to Improve Workstation Security
  • Hardening User Accounts on a Windows Workstation
  • Implementing AppLocker Policies on Windows
  • Hardening Windows Services and Removing Software
  • Patching Windows Systems
  • Implementing a Windows Workstation Password Policy
  • Implementing a Windows Account Lockout Policy
  • Configuring Windows User Rights
  • Implementing Full Disk Encryption with BitLocker
  • Encrypting USB Drives with BitLocker To Go
  • Using Windows Defender as an Antivirus Tool
  • Configuring Auditing on a Windows Workstation
  • Using Security Templates on a Windows Workstation
  • Course Summary

CyberOps Windows Hardening: Windows Workstation Hardening Best Practices

Course: 1 Hour, 30 Minutes

  • Course Overview
  • BIOS/UEFI Settings to Improve Workstation Security
  • Hardening User Accounts on a Windows Workstation
  • Implementing AppLocker Policies on Windows
  • Hardening Windows Services and Removing Software
  • Patching Windows Systems
  • Implementing a Windows Workstation Password Policy
  • Implementing a Windows Account Lockout Policy
  • Configuring Windows User Rights
  • Implementing Full Disk Encryption with BitLocker
  • Encrypting USB Drives with BitLocker To Go
  • Using Windows Defender as an Antivirus Tool
  • Configuring Auditing on a Windows Workstation
  • Using Security Templates on a Windows Workstation
  • Course Summary

Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts

Course: 1 Hour, 40 Minutes

  • Course Overview
  • Threat Intelligence
  • Key Elements of Threat Intelligence
  • The Value of Threat Intelligence
  • Using Threat Intelligence
  • Cyber Threat Actors
  • Common Indicators of Compromise
  • Intelligence versus Data versus Information
  • Threat Intelligence Lifecycle
  • Strategic Threat Intelligence
  • Tactical Threat Intelligence
  • Operational Threat Intelligence
  • Technical Threat Intelligence
  • Machine Learning and Threat Intelligence
  • Risk Modeling and Threat Intelligence
  • Threat Intelligence Use Cases
  • The Threat Landscape
  • Intrusion Detection and Analysis
  • Threat Intelligence Sources
  • Course Summary

Assessment: Security Threat Intelligence
Will test your knowledge and application of the topics presented throughout the Security Threat Intelligence courses.

Exclusive exam

IT Specialist exam

OEM Office Elearning Menu is an officially accredited Test Centre for Pearson Vue Test & Certiport. You are welcome to contact us for exams available through these Test Centres. Exams can be taken by appointment within office hours.

Date

You can start at any time! Please contact one of our training advisors.

Locations

Self-study

Learning method

E-Learning

Training duration: 23+ hours

Language

English

Tip!

Provide a quiet learning environment, time and motivation, audio equipment such as headphones or speakers for audio, account information such as login details to access the e-learning platform.

Verrijk Uw Carrière met OEM's ICT Trainingen

Waarom kiezen voor OEM?
Ervaring: Meer dan 20 jaar expertise in ICT-trainingen.
Uitgebreide Selectie: Meer dan 1000 cursussen van 200 topmerken.
Hoge Tevredenheid: Beoordeeld met een 9.0 op Springest.
Kwaliteitsgarantie: Gecertificeerde docenten en award-winning E-learning.
Partnerschappen: Microsoft Partner, EC-Council Partner, Certiport en Pearson VUE.

Blijf op de hoogte van nieuwe ervaringen

Er zijn nog geen ervaringen.

Deel je ervaring

Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

(optioneel)
(optioneel)
(optioneel)
(optioneel)
We slaan je gegevens op, en delen ze met OEM ICT Trainingen & Advies, om je via e-mail en evt. telefoon verder te helpen. Meer info vind je in ons privacybeleid.