Module 01 – THREAT MANAGEMENT
- Workbook (Pdf)
- Overview
- Reconnaissance: Tools
- Reconnaissance: Tools Part 2
- Reconnaissance: Tools Part 3
- Reconnaissance: Tools Part 4
- Reconnaissance: Techniques
- Reconnaissance: Techniques Part 2
- Reconnaissance: Techniques Part 3
- Reconnaissance: Techniques Part 4
- Data Correlation And Analytics
- Reconnaissance: Interpreting Results
- Countermeasures: Network Segmentation
- Countermeasures: Honeypots And Sinkholes
- Countermeasures: System Hardening And NAC
- Security Practices: Penetration Testing
- Security Practices: Reverse Engineering
- Security Practices: Training And Risk Evaluation
- Review Quiz (Number of attempts allowed: Unlimited)
Module 03 – CYBER INCIDENT RESPONSE
- Workbook (Pdf)
- Threat Classification
- Severity And Prioritization
- Forensics Toolkit
- Incident Response Plan
- Forensic Suites And Utilities
- Forensic Suites And Utilities Part 2
- Forensic Suites And Utilities Part 3
- Forensic Suites And Utilities Part 4
- CSIRT Roles And Communication
- Indicator Of Compromise: Network Symptoms
- Indicators Of Compromise: Host And App Symptoms
- Recovery And Post-Incident Response
- Recovery And Post-Incident Response Part 2
- Review Quiz (Number of attempts allowed: Unlimited)
Module 02 – VULNERABILITY MANAGEMENT
- Workbook (Pdf)
- Vulnerability Management Process
- Vulnerability Management: Scan Configuration
- Vulnerability Management CVSS
- Vulnerability Management: CVSS Part 2
- Vulnerability Management: Remediation
- Scan Results Verification
- Common Vulnerabilities
- Common Vulnerabilities Part 2
- Common Vulnerabilities Part 3
- Common Vulnerabilities Part 4
- Common Vulnerabilities Part 5
- Review Quiz (Number of attempts allowed: Unlimited)
Module 04 – SECURITY ARCHITECTURE AND TOOLSETS
- Workbook (Pdf)
- Cybersecurity Frameworks
- Cybersecurity Frameworks Part 2
- Policies, Controls And Procedures
- Policies, Controls And Procedures Part 2
- Identity And Access Managemnt
- Identity And Access Management Part 2
- Compensating Controls And Architecture
- Compensating Controls And Architecture Part 2
- Compensating Controls And Architecture Part 3
- Security Tools And Technologies
- Security Tools And Technologies Part 2
- Security Tools And Technologies Part 3
- Software Development Security
- Software Development Security Part 2
- Review Quiz (Number of attempts allowed: Unlimited)