Security Threat Intelligence

Type product
Logo van OEM Office Elearning Menu NL
Opleiderscore: starstarstarstarstar_half 8,7 OEM Office Elearning Menu NL heeft een gemiddelde beoordeling van 8,7 (uit 111 ervaringen)

Tip: meer info over het programma, prijs, en inschrijven? Download de brochure!

Beschrijving

De Training Security Threat Intelligence via een Speciale Certificeringspakket. 1 Jaar toegang tot revolutionaire E-learning om het examen Gemakkelijk te halen. Laat je Introduceren door te Leren via 1 Leerportaal (LMS) met Gecertificeerde Docenten. Exclusief 24/7 Online Mentor en Uitdagende Cursus Testen en Bekijk Achter de schermen alle Tips & Tricks.
Gegarandeerd altijd het Officieel Proefexamen en na de Training een Officieel Certificaat van Deelname. Optioneel Livelabs(meerprijs).

inhoud

CyberOps: Introduction to CyberOps
Course: 54 Minutes
Course Overview
Introduction to Defensive Cyber Operations
Introduction to Offensive Cyber Operations
Using Nessus to Perform a Vulnerability Scan
Using …

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Threat intelligence, IT Beveiliging / Security, Cyber Security, Penetration testing en Ethical Hacking.

De Training Security Threat Intelligence via een Speciale Certificeringspakket. 1 Jaar toegang tot revolutionaire E-learning om het examen Gemakkelijk te halen. Laat je Introduceren door te Leren via 1 Leerportaal (LMS) met Gecertificeerde Docenten. Exclusief 24/7 Online Mentor en Uitdagende Cursus Testen en Bekijk Achter de schermen alle Tips & Tricks.
Gegarandeerd altijd het Officieel Proefexamen en na de Training een Officieel Certificaat van Deelname. Optioneel Livelabs(meerprijs).

inhoud

CyberOps: Introduction to CyberOps
Course: 54 Minutes
Course Overview
Introduction to Defensive Cyber Operations
Introduction to Offensive Cyber Operations
Using Nessus to Perform a Vulnerability Scan
Using Metasploit to Attack Systems
Comparing OCO with DCO Operations
Introducing the Cyber Operations Cycle
Phases of the Cyber Operations Cycle
Offensive Team Roles
Defensive Team Roles
Supporting Team Roles
Course Summary

Security Programming: Command Line Essentials
Course: 58 Minutes
Course Overview
Command Line Properties
Bash Properties
PowerShell Environment
Text Editing Basics
Text Processing
Bash History
Process Management
Scheduled Jobs
File Monitoring
File Comparison
Redirecting Input and Output
Package Management
Course Summary

Security Programming: Code Identification
Course: 1 Hour, 9 Minutes
Course Overview
Coding Paradigms
Identifying Bash Scripts
Identifying Python Scripts
Identifying C programs
Identifying C++ programs
Identifying C# programs
Identifying Regular Expressions
Identifying PowerShell Scripts
Identifying SQL Code
Common Code Vulnerabilities
Identifying Binary Files
Verifying Downloaded Files
Course Summary

Security Programming: Scripting Essentials
Course: 1 Hour, 1 Minute
Course Overview
Introduction to Scripting
Bash Variables
Bash Conditionals
Bash Loops
Bash Functions
Python Variables
Python Conditionals
Python Loops
Python Functions
Python Imports
Python File Operations
Python Web Requests
Course Summary

Security Programming: System Essentials
Course: 57 Minutes
Course Overview
Remote Shell Access
User Accounts
IP Routing
Network Interfaces
Domain Names
Log Files
Process Reporting
Disk Use
User Activity
System Activity
Time and Date Services
/etc Configurations
Course Summary

Malware Removal: Identifying Malware Types & Classification Approaches
Course: 26 Minutes
Course Overview
Introduction to Traditional Malware Types
Understanding Worm and Trojan Viruses
Identifying Rootkits, Botnets, and Ransomware
Understanding Malware Symptoms
Tools to Fight Against Malware
Classifying the Severity of Malware
Course Summary

Malware Removal: Analyzing an Infected System
Course: 1 Hour, 45 Minutes
Course Overview
Why Analyze Malware
Introduction to Static Analysis
Introduction to Dynamic Analysis
Malware Characteristics
Static Malware Analysis
Dynamic Malware Analysis
Malware Impacts
Ports and Processes Used By Malware
Process Monitor
Wireshark
Malicious Code and Program Flow
Course Summary

Malware Removal: Remediate an Infected System
Course: 50 Minutes
Course Overview
Symptoms of an Infected System
Best Practices for Malware Removal
Remediation Approaches for Malware
Windows Malicious Software Removal Tool
Using Restore Points
Using Windows Repair Tools with Restore Points
Restoring a System Backup
Comparing Virus Removal to Complete Re-install
Viruses Affecting your Boot Environment
Using Windows Repair Tools to Solve Boot Issues
Course Summary

Malware Removal: Reporting Findings & Preventing Future Infections
Course: 31 Minutes
Course Overview
Responding to Malware Incidents
Reporting Malware Incidents
Preventing Future Malware Incidents
Planning For Recovery
Creating a System Image
Course Summary

Network Survey & Extraction: Network Analysis
Course: 58 Minutes
Course Overview
Network Scanning Tools
Identifying Network Vulnerabilities
Alternative Network Vulnerabilities
Efficient Network Scanning
Reverse IP Lookup
Identifying Services
Operating System Identification
UDP Scanning
Stealth Scanning
Connect Scanning
Zombie Scanning
ARP Scanning
Course Summary

Network Survey & Extraction: Network Monitoring
Course: 52 Minutes
Course Overview
Actively Monitoring Services
Managing Collected Data
Vulnerability Metrics
Network Reporting and Record Keeping
DNS Host Discovery
Netcat Banner Grabbing
Tcpdump Connection Filtering
Tcpdump Protocol Filtering
Gathering Site Reports
Firewall Scanning
SSL/TLS Scanning
SMTP Scanning
Course Summary

Defensive CyberOps: Defensive Cyberspace Operations
Course: 43 Minutes
Course Overview
Principles of Defensive Cyber Operations
DCO Measures and Response
DCO and Cybersecurity
DCO Maneuver Operations
DCO Analytics
DCO Missions
DCO Operating Domains
DCO Mission Owner
DCO Network Owner
DCO Planning Considerations
DCO Threat Detection and Characterization
DCO Tools and Capabilities
Course Summary

Network & Host Analysis: Protocol Analysis
Course: 58 Minutes
Course Overview
Network Data Pattern Analysis
The Open Systems Interconnection (OSI) Model
Passive and Active Scanning Approches
Capturing Traffic Using Wireshark
Filtering Traffic Using Wireshark
Customizing Packet Capturing in Wireshark
Saving and Exporting Captures in Wireshark
Highlighting Rules Using Wireshark
Extracting Files Using Wireshark
Configuring Profiles in Wireshark
Controlling Filter Display in Wireshark
Implementing Advanced Filtering in Wireshark
Course Summary

Network & Host Analysis: Network Protocols
Course: 1 Hour
Course Overview
Filtering DNS Traffic
Filtering TCP Traffic
Filtering UDP Traffic
Capturing ICMP Traffic
Examining HTTP Traffic
Inspecting SSH Traffic
Extracting FTP Traffic
Filtering Email Traffic
Capturing ARP Traffic
Capturing DHCP Traffic
Monitoring Telnet Sessions
Filtering IPv6 Traffic
Course Summary

Network & Host Analysis: Network Observations
Course: 1 Hour
Course Overview
Displaying Protocol Hierarchies in Wireshark
Identifying Endpoints Using Wireshark
Visualizing Networks
Visualizing Networks in Visio
Assessing Networks
Developing Baselines
Baselining in Wireshark
Wireshark Capture Engines
Creating Rules in Wireshark
Detecting Scans Using Wireshark
Tunneling Remotely Using Wireshark
Course Summary

Network & Host Analysis: Network Analysis Formats
Course: 1 Hour
Course Overview
NetFlow and IPFIX Collection
NetFlow and Baselining
The Benefit of Audit Logs
Application Access Control
Tapping Network Traffic
Emitting and Aggregating Logs
Queueing Events
Network Management with SNMP
Packet Capturing with PCAP
Whitelisting Applications
Using Wireshark for Event Detection
Importing and Exporting PCAP
Course Summary

Network & Host Analysis: Network Operations
Course: 1 Hour, 1 Minute
Course Overview
Network Defense Tools
Implementing NSM
SIEM for Threat Activity
Installing Suricata
Applying Suricata Rules
Creating Suricata Alerts
Generating Suricata Logs
Installing ELK Stack Prerequisites
Installing ELK Stack
Integrating Suricata and ELK Stack
Navigating Kibana for SIEM
Integrating Suricata and Wireshark
Course Summary

Forensic Analysis: Cybercrime Investigations
Course: 1 Hour, 38 Minutes
Course Overview
Packet Captures
Network Forensics
Capturing Network Traffic
Working With PCAP Files
Volatile Data
Memory Forensics Tools
Using the Volatility Framework
Windows Registry
Locating Evidence Within the Registry
Registry Analysis Tools
Categories of Digital Evidence
Gathering Digital Evidence
Computer Forensic Analysis Tools
SANS Investigative Forensic Toolkit (SIFT)
Analyzing Evidence Using SIFT
Course Summary

CyberOps Windows Hardening: Windows Server Hardening Best Practices
Course: 1 Hour, 33 Minutes
Course Overview
Windows Server Hardening Best Practices
Removing Unnecessary Windows Server Software
Hardening Network Services on a Windows Server
Windows Server User Account Hardening Best Practices
Securing Windows Accounts with a Password Policy
Configuring a Windows Server Account Lockout Policy
Limiting Windows Server Group Membership
Windows Server File System Hardening Techniques
Modifying Windows Server User Rights
Hardening Windows Servers with Additional Software
Hardening Windows DNS Servers
Hardening Windows IIS Web Servers
Auditing and Windows Server Hardening
Using Auditing to Monitor Windows Server Activity
Course Summary

CyberOps Windows Hardening: Windows Workstation Hardening Best Practices
Course: 1 Hour, 30 Minutes
Course Overview
BIOS/UEFI Settings to Improve Workstation Security
Hardening User Accounts on a Windows Workstation
Implementing AppLocker Policies on Windows
Hardening Windows Services and Removing Software
Patching Windows Systems
Implementing a Windows Workstation Password Policy
Implementing a Windows Account Lockout Policy
Configuring Windows User Rights
Implementing Full Disk Encryption with BitLocker
Encrypting USB Drives with BitLocker To Go
Using Windows Defender as an Antivirus Tool
Configuring Auditing on a Windows Workstation
Using Security Templates on a Windows Workstation
Course Summary

Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
Course: 1 Hour, 40 Minutes
Course Overview
Threat Intelligence
Key Elements of Threat Intelligence
The Value of Threat Intelligence
Using Threat Intelligence
Cyber Threat Actors
Common Indicators of Compromise
Intelligence versus Data versus Information
Threat Intelligence Lifecycle
Strategic Threat Intelligence
Tactical Threat Intelligence
Operational Threat Intelligence
Technical Threat Intelligence
Machine Learning and Threat Intelligence
Risk Modeling and Threat Intelligence
Threat Intelligence Use Cases
The Threat Landscape
Intrusion Detection and Analysis
Threat Intelligence Sources
Course Summary

Nieuw! 3x Supervoordelige Onbeperkt E-Learning abonnementen

ICT Trainingen & Cursussen abonnement
E-Learning abonnement met onbeperkte toegang tot meer dan 4.000 uur award winning 1000+ ICT trainingen, Virtuele Labs E-Books Proefexamen en testen met ter afsluiting een certificaat van deelname en digitale badges.

https://www.springest.nl/oem-office-elearning-menu/onbeperkt-it-e-leren-abonnement

Applicatie Trainingen & Cursussen abonnement
Onbeperkte toegang tot meer dan 250 award winning Applicatie E-Learning Trainingen & Cursussen met Aspire Journey's (van basis tot expert), Audio-samenvattingen, Audioboeken, E-Books, Samenvattingen, Kanalen, Virtuele Praktijk omgevingen, Proefexamens, Video's en altijd ter afsluiting een certificaat van deelname.

https://www.springest.nl/oem-office-elearning-menu/onbeperkt-applicatie-cursussen-training-abonnement

Zakelijke Vaardigheden & benodigdheden Trainingen & Cursussen abonnement
E-Learning abonnement met onbeperkte toegang tot meer dan 150 award winning zakelijke vaardigheden & benodigdheden trainingen & cursussen met Aspire Journey's (van basis tot expert), audio-samenvattingen, audioboeken, e-books, samenvattingen, kanalen, oefeningen, proefexamens, video's en altijd een certificaat van deelname.

https://www.springest.nl/oem-office-elearning-menu/onbeperkt-zakelijke-vaardigheden-training-abonnement#beschrijving

Online Demo?
Bestel direct online of maak een afspraak voor een online demo via de website van OEM Office Elearning Menu via ons contactformulier of neem telefonisch contact op.

Betalen in 3 termijnen 0% rente en zonder BKR?
Particulieren betalen in 3 termijnen, 0% rente en zonder BKR registratie met in3 op de website van OEM Office Elearning Menu.

Bekijk alle voordelen op de website van OEM Office Elearning Menu

Blijf op de hoogte van nieuwe ervaringen

Er zijn nog geen ervaringen.

Deel je ervaring

Heb je ervaring met deze cursus? Deel je ervaring en help anderen kiezen. Als dank voor de moeite doneert Springest € 1,- aan Stichting Edukans.

Er zijn nog geen veelgestelde vragen over dit product. Als je een vraag hebt, neem dan contact op met onze klantenservice.

Download gratis en vrijblijvend de informatiebrochure

Aanhef
(optioneel)
(optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.