Course Details
Home - Course Details
CyberSys
Description
Course Outline
- Introduction
- Indentigy security control types
- Threat intelligence sharing
- Classifying threats
- Threat hunting
- Network forensics
- Appliance monitoring
- Endpoint monitoring
- Email monitoring
- Configuration your SIEM
- Analyzing your SIEM
- Digital forensics
- Analyzing network IOCs
- Analyzing host-related IOCs
- Analyzing lateral Movement and pivoting IOCs
- Incident response preparation
- Detection and containment
- Containment, eradication, recovery, and post-incident actions
- Risk mitigation
- Frameworks, policies, and procedures
- Enumeration tools
- Vulnerability scanning
- Analyzing output from vulnerability scanners
- Mitigating vulnerabilities
- Identity and access management solutions
- Network architecture and segmentation
- Hardware assurance best practices
- Specialized technologies
- Non-technical data and privacy controls
- Technical data and privacy controls
- Mitigate software vulnerabilities and attacks
- Mitigate web application vulnerabilities and attacks
- Analyzing applications assessments
- Cloud and automation
- Service-oriented architecture
- Automation concepts and technologies

Mr. Tajuddin
Vertical Head Network Security/Cyber Security & Cloud Computing. MCA (Master of Computer Application) 20+ years of exp in IT Industry