Other

CYSA+ – Cyber Security Analyst

Course Overview:


Performing data analysis with the ability to identify vulnerabilities, risks, and threats. Configuring, managing, and using threat-detection tools. Securing and protecting organization systems and applications.


Course Content:


Module 1: Threat Management Part-I

  • Cybersecurity Analysts
  • Cybersecurity Roles and Responsibilities
  • Risk Evaluation
  • Frameworks and Security Controls
  • Penetration Testing Processes
  • Reconnaissance Techniques
  • Open Source Intelligence
  • Social Engineering and Topology Discovery
  • Port Scanning and Service discovery Tools
  • OS Fingerprinting

Module 2: Threat Management Part-II

  • Security Appliances
  • Configuring Firewalls
  • Intrusion Detection and Prevention
  • Configuring IDS
  • Configuring Anti-virus Software
  • Enhanced mitigation experience toolkit
  • Logging and Analysis
  • Malware Threats
  • Packet capture
  • Packet capture Tools
  • Monitoring tools
  • Log review and SIEM
  • SIEM data outputs

Module 3: Vulnerability Management

  • Managing vulnerabilities
  • Vulnerability management requirements
  • Asset inventory
  • Data classification
  • Vulnerability management processes
  • Vulnerability scanners
  • Microsoft baseline security analyzer
  • Beyond Trust
  • Configuring vulnerability scans
  • Vulnerability scanning criteria
  • Exploit frameworks
  • Remediating vulnerabilities
  • Remediation and change control
  • Remediating Host vulnerabilities
  • Remediating Network vulnerabilities
  • Remediating Virtual Infrastructure vulnerabilities
  • Secure Software Development
  • Software Development life cycle
  • Software Vulnerabilities
  • Software security testing
  • Web application firewalls
  • Source authenticity
  • Reverse engineering

Module 4: Cyber Incident Response

  • Incident response
  • Incident response processes
  • Threat classification
  • Incident severity and prioritization
  • Types of Data Breaches
  • Computer Forensics
  • Digital Forensics Investigation Process
  • Documentation
  • Image acquisition
  • Password cracking
  • Analysis utilities
  • Incident analysis and recovery
  • Analyzing network symptoms
  • Analyzing host symptoms
  • Analyzing application symptoms
  • Using sysinternals
  • Incident Handling Tools

Module 5: Security Architecture

  • Secure Network Design
  • Control Types
  • Network Segmentation
  • Blackholes | Sinkholes and Honeypots
  • System Hardening
  • Group Policies
  • Endpoint Security
  • Identity and Access Management
  • Network Access Control
  • Identity security issues
  • Authorization & Authentication
  • Single sign on
  • Exploiting identities
  • Security frameworks
  • Security Policies and Procedures
  • Personnel Policies and Training

 

Please Note:


Target Groups:-

* Engineering Students

– Electrical Students

– Electronics Students

– Mechanical Students

– Mechatronics Students

– IT Related Students

– Technical Students

* Working Professionals

– Mechanical Engineering

– Electrical Engineering

– Electronics Engineering

– Mechatronics Engineering

– IT Related Professionals

– Technicians

Duration

1 Month

Category

Other

Course Level

Other

Related Courses

Physical
European Nations Campus

Diploma in UK AMI

Diploma in UK AMI

clock-img

Duration

4 to 6 Months

Medium

English

Physical
BCI Campus

Bachelor of Education Honours in Early Childhood Education

Bachelor of Education Honours in Early Childhood Education

clock-img

Duration

4 years

Medium

English

Physical
Ocean University of Sri Lanka

Ocean University of Sri Lanka- Pre Sea Training for Engine Rating (Motorman)

Ocean University of Sri Lanka- Pre Sea Training for Engine Rating (Motorman)

clock-img

Duration

6 months

Medium

English

Physical
BCI Campus

Bachelor of Education Honours in Primary Education

Bachelor of Education Honours in Primary Education

clock-img

Duration

4 Years

Medium

English

Physical
ETMA Campus

PHP

PHP

clock-img

Duration

1 Month

Medium

English

Online
Java Institute for Advanced Technology

Bioinformatics

Bioinformatics

clock-img

Duration

Hours 110

Medium

English

Ask from ETMA Campus