Overview

This intensive and practitioner-focused training is designed to help you gain the knowledge, skills, abilities, and confidence required to protect and defend organizational information systems against cyber adversaries.


Course description

A cyber defense analyst uses data collected from a variety of cyber defense tools (e.g. web application firewall (WAF), file integrity monitor (FIM), IDS, network firewalls, vulnerability scanner, etc.) and information systems to analyze events that occur within his/her environment for the purposes of thwarting cyber adversaries.


Prerequisite

Basic knowledge of how computers and the Internet work


Who can take this course?

  • Cyber Enthusiasts
  • IT Professionals
  • Students & Graduates
  • Cybersecurity Internship Seekers

This course includes

  • Self-paced; over 13 hours of on-demand video
  • Over 18 hours of lab exercises
  • Anytime access (from computer, tablet or mobile phone)
  • Labs and Project
  • End of Training Workshop

Key Learning Objectives

At the end of this course, learners will be able to

  • Master all learning objectives from the cyber defense associate course
  • Discuss cloud security and the shared responsibility matrix
  • Explain how a cloud access security solution works and recall the major vendors in this market space
  • Discuss the importance of a cloud security posture management solution
  • Demonstrate an understanding of key risk management terms and definitions
  • Align cyber risk management efforts with an enterprise risk management program
  • Discuss the risk assessment process
  • Describe the process of risk analysis and the expected outcome of the exercise
  • Demonstrate an understanding of risk appetite and risk tolerance
  • Recall key considerations related to the crafting of a risk assessment report
  • List and explain each of the four common risk response actions
  • Outline the importance of risk monitoring and demonstrate an understanding of the process
  • Recall elements of cyber security governance
  • List and discuss motivations for cyber defense
  • Demonstrate basic understanding of the functions of a cyber security steering committee
  • Explain the role of the compliance function in cyber defense
  • Demonstrate good understanding of the role of Internal Audit in cyber defense


Course Curriculum

  SECTION 1 - THE NICE FRAMEWORK AND CYBER SECURITY ESSENTIALS
Available in days
days after you enroll
  SECTION 2 - CYBER THREATS, VULNERABILITIES AND ATTACKS
Available in days
days after you enroll
  SECTION 3 – PROTECTIVE CYBER SECURITY TECHNOLOGIES
Available in days
days after you enroll
  SECTION 4 - ELEMENTS OF A SECURITY OPERATIONS CENTER (SOC)
Available in days
days after you enroll
  SECTION 5 – CYBER RISK MANAGEMENT, LAWS, AND GOVERNANCE
Available in days
days after you enroll
  SECTION 6 - INCIDENT RESPONSE SCENARIOS
Available in days
days after you enroll
  Wrap up
Available in days
days after you enroll

Cyber Defense Lab


Our lab environment closely mirrors the real-world business environment where students get to play the role of a cyber security professional.

20 Unique Cyber Security Challenges!


Solve real world cyber security challenges by following structured incident response steps

This course is closed for enrollment.

This course is closed for enrollment.