C)CSA: Cybersecurity Analyst Mile 2

4.6 out of 5 rating

Jump to dates

Duration

5 Days

30 CPD hours

This course is intended for

Security Professionals
Incident Handling Professionals
Anyone in a Security Operations Center
Forensics Experts
Cybersecurity Analysts

Overview

Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.
Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today’s needs.
When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today’s exploits.
This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam.

Description

Our Certified Cyber Security Analyst course helps you prepare an organization to create a complete end to end solution for proactively monitoring, preventing, detecting, and mitigating threats as they arise in real time.Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today?s needs.When we are done you will be able to setup and deploy state of the art open source and for purchase analysis tools, intrusion detection tools, syslog servers, SIEMs, along with integrating them for the entire company to find and an many cases prevent today?s exploits.This course maps to the mile2 Certified Cyber Security Analyst Exam as well as the CompTIA CySA+CS0-001 certification exam.

Blue Team?Principles
  • Network Architecture?and how it lays the groundwork
  • Defensive Network
  • Security Data Locations?and how they tie together
  • Security?Operations?Center
  • The People, Processes, and Technology
  • Triage and Analysis
  • Digital Forensics
  • Incident Handling
  • Vulnerability Management
  • Automation, Improvement, and Tuning
Digital?Forensics
  • Investigative Theory and?Processes
  • Digital Acquisition
  • Evidence Protocols
  • Evidence Presentation
  • Computer Forensics?Laboratory
  • Protocols
  • Processing Techniques
  • Specialized?Artifacts
  • Advanced Forensics for Today?s?Exploitations
Malware Analysis
  • Creating the Safe Environment
  • Static Analysis
  • Dynamic Analysis
  • Behavior Based Analysis
  • What is different about?Ransomware?
  • Manual Code Reversing
Traffic Analysis
  • Manual Analysis Principles
  • Automated?Analysis Principles
  • Signatures?compared to?Behaviors
  • Application Protocols Analysis Principles
  • Networking Forensics
Assessing the Current State of Defense with the?Organization
  • Network Architecture and Monitoring
  • Endpoint Architecture and Monitoring
  • Automation, Improvement, and continuous?monitoring
Leveraging SIEM for Advanced Analytics
  • Architectural Benefits
  • Profiling and?Baselining
  • Advanced Analytics
Defeating the Red Team with Purple Team tactics
  • Penetration Testing?with full knowledge
  • Reconnaissance
  • Scanning
  • Enumeration
  • Exploitation
  • Lateral Movement
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.