Module 1: UNDERSTANDING VULNERABILITY RESPONSE, HANDLING, AND MANAGEMENT
- Understanding Cybersecurity Leadership Concepts
- Exploring Control Types and Methods
- Explaining Patch Management Concepts
Module 2: EXPLORING THREAT INTELLIGENCE AND THREAT HUNTING CONCEPTS
- Exploring Threat Actor Concepts
- Identifying Active Threats
- Exploring Threat-Hunting Concepts
Module 3: EXPLAINING IMPORTANT SYSTEM AND NETWORK ARCHITECTURE CONCEPTS
- Reviewing System and Network Architecture Concepts
- Exploring Identity and Access Management (IAM)
- Maintaining Operational Visibility
Module 4: UNDERSTANDING PROCESS IMPROVEMENT IN SECURITY OPERATIONS
- Exploring Leadership in Security Operations
- Understanding Technology for Security Operations
Module 5: IMPLEMENTING VULNERABILITY SCANNING METHODS
- Explaining Compliance Requirements
- Understanding Vulnerability Scanning Methods
- Exploring Special Considerations in Vulnerability Scanning
Module 6: PERFORMING VULNERABILITY ANALYSIS
- Understanding Vulnerability Scoring Concepts
- Exploring Vulnerability Context Considerations
Module 7: COMMUNICATING VULNERABILITY INFORMATION
- Explaining Effective Communication Concepts
- Understanding Vulnerability Reporting Outcomes and Action Plans
Module 8: EXPLAINING INCIDENT RESPONSE ACTIVITIES
- Exploring Incident Response Planning
- Performing Incident Response Activities
Module 9: DEMONSTRATING INCIDENT RESPONSE COMMUNICATION
- Understanding Incident Response Communication
- Analysing Incident Response Activities
Module 10: APPLYING TOOLS TO IDENTIFY MALICIOUS ACTIVITY
- Identifying Malicious Activity
- Explaining Attack Methodology Frameworks
- Explaining Techniques for Identifying Malicious Activity
Module 11: ANALYSING POTENTIALLY MALICIOUS ACTIVITY
- Exploring Network Attack Indicators
- Exploring Host Attack Indicators
- Exploring Vulnerability Assessment Tools
Module 12: UNDERSTANDING APPLICATION VULNERABILITY ASSESSMENT
- Analysing Web Vulnerabilities
- Analysing Cloud Vulnerabilities
Module 13: EXPLORING SCRIPTING TOOLS AND ANALYSIS CONCEPTS
- Understanding Scripting Languages
- Identifying Malicious Activity Through Analysis
Module 14: UNDERSTANDING APPLICATION SECURITY AND ATTACK MITIGATION BEST PRACTICES
- Exploring Secure Software Development Practices
- Recommending Controls to Mitigate Successful Application Attacks
- Implementing Controls to Prevent Attacks
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Hiçbir şikayetim yok. Eğitmenimiz bilgi birikimi bakımından çok donanımlıydı ve bizlere çok iyi fikirler bilgiler verdi. Kullandığı dokümanlar da çok bilgili ve detaylıydı. Teşekkür ediyorum.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Çok memnum kaldım, çok sağ olun.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitim çok kaliteliydi. Bundan sonra şahsi olarak eğitim almak istersem uğrayacağım ilk yer olur.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitimi 5 yıldız olarak puanladı.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitimi 5 yıldız olarak puanladı.
KoçSistem Bilgi ve İletişim Hizmetleri A.Ş
Eğitimi 5 yıldız olarak puanladı.