Modules
1 -
System & Network Security Implementation Concepts
#
Lesson
Type
1.
Exercise 1 - Log Collection with Splunk

2.
Exercise 2 - Encrypting Sensitive Data

3.
Exercise 3 - Enable Multifactor Authentication

2 -
Threat Intelligence & Threat Gathering Concepts
#
Lesson
Type
1.
Exercise 1 - Collection Methods and Sources

2.
Exercise 2 - Threat Intelligence Hunting and Sharing

3 -
Techniques to Determine Malicious Activity
#
Lesson
Type
1.
Exercise 1 - Monitor Windows Event Log with a PowerShell Script

2.
Exercise 2 - Monitor Login Events on Linux Devices

4 -
Vulnerability Scanning Tools & Techniques
#
Lesson
Type
1.
Exercise 1 - Network Asset Detection Tools

2.
Exercise 2 - Detecting Network Vulnerabilities

5 -
Identifying & Analyzing Malicious Activity
#
Lesson
Type
1.
Exercise 1 - Analyze Resource Utilization

2.
Exercise 2 - Detecting Unauthorized User Privilege Escalation

6 -
Tools for Identifying Malicious Activity
#
Lesson
Type
1.
Exercise 1 - Monitoring Network Activity

2.
Exercise 2 - Using a Sandbox for Analyzing Malicious Files

3.
Exercise 3 - Validating Domain Names and IP Addresses

7 -
Attack Methodology Frameworks
#
Lesson
Type
1.
Exercise 1 - Attack Methodology Frameworks

2.
Exercise 2 - OWASP Testing Framework

8 -
Vulnerability Data Analysis and Prioritization
#
Lesson
Type
1.
Exercise 1 - Common Vulnerability Scoring System (CVSS) Calculator

2.
Exercise 2 - Detecting Web Application Vulnerabilities

9 -
Incident Response Management Techniques
#
Lesson
Type
1.
Exercise 1 - Review Incident Response Playbooks

2.
Exercise 2 - Use Splunk to Monitor for Port Scanning

3.
Exercise 3 - Create a Forensic Image for Investigation

10 -
Incident Response Communication & Reporting
#
Lesson
Type
1.
Exercise 1 - Review Guidance for Coordination and Information Sharing

2.
Exercise 2 - Review Required Reports

3.
Exercise 3 - Review the IBM Security Cost of a Data Breach Report 2022

11 -
Vulnerability Reporting Concepts
#
Lesson
Type
1.
Exercise 1 - Log Collection with Splunk

2.
Exercise 2 - Creating a Vulnerability Report with Splunk

12 -
Vulnerability Patching & Attack Surface Management
#
Lesson
Type
1.
Exercise 1 - Windows Patch Management Techniques

2.
Exercise 2 - Linux Patch Management Techniques
