CYBR410 — Applied Cyber Defense
Hands-on course with practical experiences in cybersecurity threats, mitigations, malware analysis, and cyber defense scenarios.
Learning Objectives & Matches
Defend computer systems and networks against active cyber attacks
Maintain cyber defense software or hardware to support responses to cyber incidents.
Write cyber defense recommendations, reports, or white papers using research or experience.
Develop and execute tests that simulate the techniques of known cyber threat actors.
Recommend cyber defense software or hardware to support responses to cyber incidents.
Conduct predictive or reactive analyses on security measures to support cyber security initiatives.
Identify new threat tactics, techniques, or procedures used by cyber threat actors.
Update corporate policies to improve cyber security.
Gather cyber intelligence to identify vulnerabilities.
Plan, coordinate, and implement network security measures to protect data, software, and hardware.
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
Analyze malware samples to understand behavior, capabilities, and indicators of compromise
Implement and configure security controls including access controls and monitoring systems
Implement controls to provide security for operating systems, software, and data.
Provide customers or installation teams guidelines for implementing secure systems.
Design and implement Web site security measures, such as firewalls and message encryption.
Assess the quality of security controls, using performance indicators.
Implement Web site security measures, such as firewalls or message encryption.
Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
Identify or implement solutions to information security problems.
Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
Identify, standardize, and communicate levels of access and security.
Respond to and investigate security incidents following incident response procedures
Develop response and recovery strategies for security breaches.
Identify or implement solutions to information security problems.
Discuss security solutions with information technology teams or management.
Implement catastrophic failure handlers to identify security breaches and prevent serious damage.
Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
Monitor systems for intrusions or denial of service attacks, and report security breaches to appropriate personnel.
Maintain cyber defense software or hardware to support responses to cyber incidents.
Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
Prepare and submit reports describing the results of security fixes.
Develop and test security mitigation strategies for known attack vectors