Introduction To The Cyber Security Analyst Course
Course Overview
Cyber Security Overview
Speak Cybertalk
Introduction to Cyber Security
Introduction to Cyber Security – Module Overview
The CIA Triad
Defence in Depth
Security, Controls, and Limitations
Introduction to Types of Data
Introduction to Malware
Introduction to Cryptography
Introduction to Social Engineering
Introduction to Threat Actors
Security Analyst Overview and Further Reading
Introduction to Cyber Security – Module Quiz
Introduction to Cyber Security – Module Quiz
The SOC and the Tier 1 Analyst Role
Understanding the Role
Overview of the Capabilities of a SOC
SOC Job Roles
Tasks, Duties, and Responsibilities
Monitoring, Detection, and Alerts
Isolation and Containment
Reporting
Online Services and Tools
The SOC and the Tier 1 Analyst Role Quiz
Operating System Security
Operating System Security
Technical Foundations Handbook
Introduction to Technical Exercises
OS Lockdown – Windows Server 2016
Windows Server 2016 Lockdown Demonstration
OS Lockdown – Linux
OS Lockdown Quiz
Advanced Threat Analysis
Analysing Advanced Threats
Cyber Kill Chain
Overview of Diamond Model Intrusion Analysis
Lazarus 1 Research Questionnaire
Lazarus 1 Research Questionnaire
Introduction to Incident Response
Incident Response
Introduction to Playbooks
Tech Stack Introduction
Tech Stack Details 1
Tech Stack Details 2
Firewalls
IDPS
Create an Incident Response Playbook
Incident Response Quiz
Incident Response Quiz
Lazarus 2 Questionnaire
Lazarus 2 Questionnaire
Security Information and Event Management
SIEMs and Network Traffic Analysis
Event Logs
Interpreting Logs
Wazuh Overview
Wazuh Operations
Wazuh Server Installation
Wazuh Agent Installation
Wazuh Exercise
Wireshark Installation and Operation
Network Traffic Analysis
Wazuh and NTA Quiz
Wazuh and NTA Quiz
Cyber Security Analyst Certification Quiz
Cyber Security Analyst Certification Quiz
Course Feedback
Cyber Security Final Quiz