×
Phoenix TS

Cyber Threats Detection and Mitigation Training

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

This training course examines the fundamentals of system forensics: what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. It also gives an overview of computer crimes, forensic methods, and laboratories. Students will learn about the tools, techniques, and methods used to perform computer forensics and investigation. This course explores emerging technologies as well as future directions of this interesting and cutting-edge field.

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Objectives

  • Understand the importance of having a solid foundation for your security posture
  • Understand the attack strategy using cyber security kill chain
  • Enhance their defense strategy by improving security policies, hardening the network, implementing active sensors, and leveraging threat intelligence
  • Perform an incident investigation
  • Understand the recovery process
  • Understand continuous security monitoring and how to implement a vulnerability management strategy
  • Perform log analysis to identify suspicious activities

Course Outline

Security Posture

  • The current threat landscape
  • Cybersecurity challenges
  • Enhancing your security posture
  • The Red and Blue Team

Incident Response Process

  • Incident response process
  • Handling an incident
  • Post-incident activity
  • Incident response in the cloud

Understanding the Cybersecurity Kill Chain

  • External reconnaissance
  • Access and privilege escalation
  • Exfiltration
  • Sustainment
  • Assault
  • Obfuscation
  • Threat life cycle management

Reconnaissance

  • External reconnaissance
  • Internal reconnaissance
  • Conclusion of the reconnaissance chapter

Compromising the System

  • Analyzing current trends
  • Phishing
  • Exploiting a vulnerability
  • Zero-day
  • Performing the steps to compromise a system

Chasing a User’s Identity

  • Identity is the new perimeter
  • Strategies for compromising a user’s identity
  • Hacking a user’s identity

Lateral Movement

  • Infiltration
  • Performing lateral movement

Privilege Escalation

  • Infiltration
  • Avoiding alerts
  • Performing privilege escalation
  • Conclusion and lessons learned

Security Policy

  • Reviewing your security policy
  • Educating the end user
  • Policy enforcement
  • Monitoring for compliance

Network Segmentation

  • Defense in depth approach
  • Physical network segmentation
  • Securing remote access to the network
  • Virtual network segmentation
  • Hybrid cloud network security

Active Sensors

  • Detection capabilities
  • Intrusion detection systems
  • Intrusion prevention system
  • Behavior analytics on-premises
  • Behavior analytics in a hybrid cloud

Threat Intelligence

  • Introduction to threat intelligence
  • Open source tools for threat intelligence
  • Microsoft threat intelligence
  • Leveraging threat intelligence to investigate suspicious activity

Investigating an Incident

  • Scoping the issue
  • Investigating a compromised system on-premises
  • Investigating a compromised system in a hybrid cloud

Recovery Process

  • Disaster recovery plan
  • Live recovery
  • Contingency planning
  • Best practices for recovery 

Vulnerability Management

  • Creating a vulnerability management strategy
  • Implementation of vulnerability management
  • Best practices for vulnerability management
  • Implementing vulnerability management with Nessus

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)