Agenda szkolenia
- Understanding Vulnerability Response, Handling, and Management
- Understanding Cybersecurity Leadership Concepts
- Exploring Control Types and Methods
- Explaining Patch Management Concepts
- Exploring Threat Intelligence and Threat Hunting Concepts
- Exploring Threat Actor Concepts
- Identifying Active Threats
- Exploring Threat-Hunting Concepts
- Explaining Important System and Network Architecture Concepts
- Reviewing System and Network Architecture Concepts
- Exploring Identity and Access Management (IAM)
- Maintaining Operational Visibility
- Understanding Process Improvement in Security Operations
- Exploring Leadership in Security Operations
- Understanding Technology for Security Operations
- Implementing Vulnerability Scanning Methods
- Explaining Compliance Requirements
- Understanding Vulnerability Scanning Methods
- Exploring Special Considerations in Vulnerability Scanning
- Performing Vulnerability Analysis
- Understanding Vulnerability Scoring Concepts
- Exploring Vulnerability Context Considerations
- Communicating Vulnerability Information
- Explaining Effective Communication Concepts
- Understanding Vulnerability Reporting Outcomes and Action Plans
- Explaining Incident Response Activities
- Exploring Incident Response Planning
- Performing Incident Response Activities
- Demonstrating Incident Response Communication
- Understanding Incident Response Communication
- Analyzing Incident Response Activities
- Applying Tools to Identify Malicious Activity
- Identifying Malicious Activity
- Explaining Attack Methodology Frameworks
- Explaining Techniques for Identifying Malicious Activity
- Analyzing Potentially Malicious Activity
- Exploring Network Attack Indicators
- Exploring Host Attack Indicators
- Exploring Vulnerability Assessment Tools
- Understanding Application Vulnerability Assessment
- Analyzing Web Vulnerabilities
- Analyzing Cloud Vulnerabilities
- Exploring Scripting Tools and Analysis Concepts
- Understanding Scripting Languages
- Identifying Malicious Activity Through Analysis
- Understanding Application Security and Attack Mitigation Best Practices
- Exploring Secure Software Development Practices
- Recommending Controls to Mitigate Successful Application Attacks
- Implementing Controls to Prevent Attacks