Security Cyber Analytics
The world has converged today, especially with everything and everyone connected across the cyber space. Every day, massive data is exchanged across the cyber world, a lot of which is highly sensitive information that needs to be protected from all sorts of cybercrimes. Cybersecurity is a must-have for information security and IT professionals, in order to safeguard their business interests. Monitoring and threat detection are crucial if businesses are to stay ahead of the curve. Security Analytics is an approach to cybersecurity focused on the analysis of data to produce proactive security measures.
Star Security Cyber Analytics is a thorough training program that will teach learners to spot vulnerabilities, fend off attacks, and immediately respond to emergencies. The program explains the use of various security analytics tools to implement real-time monitoring of servers, endpoints and network traffic, consolidate and coordinate diverse event data from application and network logs, and perform forensic analysis to better understand attack methods and system vulnerabilities.
Audience
Course Objectives
In this course, you will learn about:
- Fundamentals of Cybersecurity
- Threats associated with network security
- Reconnaissance techniques and incident response process
- Vulnerability management and scanning result analysis
- Evaluating and mending the incident
- How to secure your organization environment from common vulnerabilities
- How to analyse the threats and take appropriate action to mitigate the threats
- Access management and compensating Controls
- How to implement secure software development life cycle
Course Outcome
After competing this course, you will be able to:
- Explain cybersecurity analytics concepts
- Use techniques to manage threats and deal with incidents
- Fetch login credentials by exploiting vulnerabilities
- Protect systems against vulnerabilities and threats by investigating and applying the appropriate countermeasures
- Recover deleted files by analysing the forensic image
- Deploy security measures for secure software development
- Investigate live systems and crack passwords
Table Of Contents Outline
- Fundamentals of Cybersecurity
- Preventing Networks from Cybersecurity Threats
- Managing Threats Using Reconnaissance Techniques
- Understanding Vulnerability Management
- Analysing Results of Vulnerability Scans
- Understanding Incident Response Process
- Dealing with Incidents
- Understanding Forensic Investigations
- Exploring Principles and Concepts of Security Architecture
- Exploring Security Issues Encountered in Identity and Access Management
- Supporting Defence-in-Depth Security Architecture with Compensating Controls
- Securing Software Development
- Labs
- Lab Session 1 - Using Microsoft Baseline Security Analyzer for Scanning a Computer
- Lab Session 2 - Verifying Drive/Image Using FTK Imager
- Lab Session 3 - Fetching Login Credentials by Exploiting Vulnerabilities in a Website Using Burp Suite
- Lab Session 4 - Recovering Deleted Files by Analysing the Forensic Image Using Autopsy
- Lab Session 5 - Discovering Vulnerabilities in a System Using Nessus
- Lab Session 6 - Preventing Malware Using Enhanced Mitigation Experience Toolkit (EMET)
- Lab Session 7 - Investigating a Live System Using Helix3
- Lab Session 8 - Using Wireshark to Capture and Analyse the Flow of Packets in a Network
- Lab Session 9 - Scanning Open Ports on a Kali Linux System Using Nmap
- Lab Session 10 - Cracking Passwords from its Hash Form Using John the Ripper