Description
In Class & Live, Online Training(Cyber Security)
You will learn how to:
- In network environments, assess the security threats.
- Detect harmful actions using computing systems effectively.
- Examine post-attack strategies and apply abilities to reply proactively.
- Evaluate the dangers and vulnerabilities to perform examination and decide the scope in an immersive hands-on environment.
- Viably secure basic data frameworks some time recently, amid, and after an assault.
- Prepare for evaluations by gathering cybersecurity intelligence.
- Develop the abilities you’ll need to reduce the time between when a breach happens and when it’s discovered.
Who Should Participate:
- Paragon Cyber Security Certification is planned for experts who want, or are required, to protect critical information systems.
- You must have 3-5 years of experience working in an IT environment and familiarity with administration, networks, systems.
Topics Covered:
- Categorize Threats and Threat Profiles
- Perform Ongoing Threat Research
- Determine the importance of risk management
- Evaluate Risk
- Alleviate Risk
- Merge Documentation into Risk Management
- Execute Threat Modelling
- Evaluate the Impact of Reconnaissance
- Evaluate the Impact of Social Engineering
- Evaluate the Impact of System Hacking Attacks
- Evaluate the Impact of Web-Based Attacks
- Evaluate the Impact of Malware
- Evaluate the Impact of Hijacking and Impersonation Attacks
- Evaluate the Impact of DoS Incidents
- Evaluate the Impact of Threats to Mobile Security
- Evaluate the Impact of Threats to Cloud Security
- Evaluate Command and Control Techniques
- Evaluate Persistence Techniques
- Evaluate Lateral Movement and Pivoting Techniques
- Evaluate Data Exfiltration Techniques
- Evaluate Anti-Forensics Techniques
- Execute a Vulnerability Management Plan
- Evaluate Common Vulnerabilities
- Manage Vulnerability Scans
- Manage Penetration Tests on Network Assets
- Investigate on Penetration Testing
- Examine Incidents with Windows-Based Tools
- Examine Incidents with Linux-Based Tools
- Examine Malware
- Examine Indicators of Compromise
- Establish a Security Intelligence Collection and Analysis Platform
- Gather Data from Network-Based Intelligence Sources
- Gather Data from Host-Based Intelligence Sources
- Use Common Tools to Examine Logs
- Use SIEM Tools for Analysis
- Deploy an Incident Handling and Response Architecture
- Contain and Mitigate Incidents
- Prepare for Forensic Investigation as a CSIRT
- Register a Forensic Investigation Plan
- Securely Gather and Examine Electronic Evidence
- Research on the Results of an Investigation
Frequently asked questions: Can I take this course online? Yes
Reviews
There are no reviews yet.