Class Details

Cyber Threats Detection and Mitigation Training Course Price: $2,500

Training promotions may be available, contact a training consultant at 240-667-7757 for more information!

This course examines the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Students will learn about the tools, techniques, and methods used to perform computer forensics and investigation. This course explores emerging technologies as well as future directions of this interesting and cutting-edge field.

Price Match Guarantee Phoenix TS

Cyber Threats Detection and Mitigation Training Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Course retake option
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available throughout the day
  • Freshly baked cookies every afternoon - *only at participating locations

Course Outline

SECURITY POSTURE

  • The current threat landscape
  • Cybersecurity challenges
  • Enhancing your security posture
  • The Red and Blue Team

INCIDENT RESPONSE PROCESS

  • Incident response process
  • Handling an incident
  • Post-incident activity
  • Incident response in the cloud

UNDERSTANDING THE CYBERSECURITY KILL CHAIN

  • External reconnaissance
  • Access and privilege escalation
  • Exfiltration
  • Sustainment
  • Assault
  • Obfuscation
  • Threat life cycle management

 RECONNAISSANCE

  • External reconnaissance
  • Internal reconnaissance
  • Conclusion of the reconnaissance chapter

 COMPROMISING THE SYSTEM

  • Analyzing current trends
  • Phishing
  • Exploiting a vulnerability
  • Zero-day
  • Performing the steps to compromise a system

 CHASING A USER'S IDENTITY

  • Identity is the new perimeter
  • Strategies for compromising a user's identity
  • Hacking a user's identity

 LATERAL MOVEMENT

  • Infiltration
  • Performing lateral movement

PRIVILEGE ESCALATION

  • Infiltration
  • Avoiding alerts
  • Performing privilege escalation
  • Conclusion and lessons learned

SECURITY POLICY

  • Reviewing your security policy
  • Educating the end user
  • Policy enforcement
  • Monitoring for compliance

NETWORK SEGMENTATION

  • Defense in depth approach
  • Physical network segmentation
  • Securing remote access to the network
  • Virtual network segmentation
  • Hybrid cloud network security

ACTIVE SENSORS

  • Detection capabilities
  • Intrusion detection systems
  • Intrusion prevention system
  • Behavior analytics on-premises
  • Behavior analytics in a hybrid cloud

THREAT INTELLIGENCE

  • Introduction to threat intelligence
  • Open source tools for threat intelligence
  • Microsoft threat intelligence
  • Leveraging threat intelligence to investigate suspicious activity

INVESTIGATING AN INCIDENT

  • Scoping the issue
  • Investigating a compromised system on-premises
  • Investigating a compromised system in a hybrid cloud

RECOVERY PROCESS

  • Disaster recovery plan
  • Live recovery
  • Contingency planning
  • Best practices for recovery 

VULNERABILITY MANAGEMENT

  • Creating a vulnerability management strategy
  • Implementation of vulnerability management
  • Best practices for vulnerability management
  • Implementing vulnerability management with Nessus

Objectives

Cyber Threats Detection and Mitigation Course Objectives:

  • Understand the importance of having a solid foundation for your security posture
  • Understand the attack strategy using cyber security kill chain
  • Enhance their defense strategy by improving security policies, hardening the network, implementing active sensors, and leveraging threat intelligence
  • Perform an incident investigation
  • Understand the recovery process
  • Understand continuous security monitoring and how to implement a vulnerability management strategy
  • Perform log analysis to identify suspicious activities