Module 01 – THREAT MANAGEMENT

  1. Workbook (Pdf)
  2. Overview
  3. Reconnaissance: Tools
  4. Reconnaissance: Tools Part 2
  5. Reconnaissance: Tools Part 3
  6. Reconnaissance: Tools Part 4
  7. Reconnaissance: Techniques
  8. Reconnaissance: Techniques Part 2
  9. Reconnaissance: Techniques Part 3
  10. Reconnaissance: Techniques Part 4
  11. Data Correlation And Analytics
  12. Reconnaissance: Interpreting Results
  13. Countermeasures: Network Segmentation
  14. Countermeasures: Honeypots And Sinkholes
  15. Countermeasures: System Hardening And NAC
  16. Security Practices: Penetration Testing
  17. Security Practices: Reverse Engineering
  18. Security Practices: Training And Risk Evaluation
  19. Review Quiz (Number of attempts allowed: Unlimited)

Module 03 – CYBER INCIDENT RESPONSE

  1. Workbook (Pdf)
  2. Threat Classification
  3. Severity And Prioritization
  4. Forensics Toolkit
  5. Incident Response Plan
  6. Forensic Suites And Utilities
  7. Forensic Suites And Utilities Part 2
  8. Forensic Suites And Utilities Part 3
  9. Forensic Suites And Utilities Part 4
  10. CSIRT Roles And Communication
  11. Indicator Of Compromise: Network Symptoms
  12. Indicators Of Compromise: Host And App Symptoms
  13. Recovery And Post-Incident Response
  14. Recovery And Post-Incident Response Part 2
  15. Review Quiz (Number of attempts allowed: Unlimited)

Module 02 – VULNERABILITY MANAGEMENT

  1. Workbook (Pdf)
  2. Vulnerability Management Process
  3. Vulnerability Management: Scan Configuration
  4. Vulnerability Management CVSS
  5. Vulnerability Management: CVSS Part 2
  6. Vulnerability Management: Remediation
  7. Scan Results Verification
  8. Common Vulnerabilities
  9. Common Vulnerabilities Part 2
  10. Common Vulnerabilities Part 3
  11. Common Vulnerabilities Part 4
  12. Common Vulnerabilities Part 5
  13. Review Quiz (Number of attempts allowed: Unlimited)

Module 04 – SECURITY ARCHITECTURE AND TOOLSETS

  1. Workbook (Pdf)
  2. Cybersecurity Frameworks
  3. Cybersecurity Frameworks Part 2
  4. Policies, Controls And Procedures
  5. Policies, Controls And Procedures Part 2
  6. Identity And Access Managemnt
  7. Identity And Access Management Part 2
  8. Compensating Controls And Architecture
  9. Compensating Controls And Architecture Part 2
  10. Compensating Controls And Architecture Part 3
  11. Security Tools And Technologies
  12. Security Tools And Technologies Part 2
  13. Security Tools And Technologies Part 3
  14. Software Development Security
  15. Software Development Security Part 2
  16. Review Quiz (Number of attempts allowed: Unlimited)