![]() Essential cheat sheets for tools and complex analysis tasksĪt the completion of SEC504 you will be able to:.Bonus content and hands-on exercises to develop your skills beyond the course.A digital index for quick reference access to all course materials.Visual association maps to break down complex material.Access to custom, interactive training tools to develop Linux and PowerShell expertise.Step-by-step video walkthroughs for all lab exercises.Printed and electronic course books and a hands-on workbook.Unlimited access to all hands-on exercises that never expires.How attackers exploit publicly-accessible systems including Microsoft 365. ![]() Attacker steps for internal discovery and lateral movement after an initial compromise.Attacker techniques to evade endpoint detection tools including EDR and XDR platforms.How attackers leverage cloud systems against organizations.Defense spotlight strategies to protect critical assets.How to accelerate your incident response using generative AI systems.Cyber investigation processes using live analysis, network insight, memory forensics, and malware reverse engineering.Leverage PowerShell for data collection and cyber threat analysis.Best practices for effective cloud incident response.Identify threats using host, network, and log analysis.Apply a dynamic approach to incident response.By getting into the mindset of attackers, you will learn how they apply their tactics, techniques, and procedures against your organization, and you will be able to use that insight to anticipate their moves and build better defenses. In the hands-on environment provided by SEC504, you will use same tools attackers use to understand how they are applied and the artifacts they leave behind. To fully grasp the actions attackers take against an organization you also need to understand their tools and techniques. Understanding the steps to effectively conduct incident response is only one part of the equation. All lab exercises come with detailed walkthrough video content to help reinforce the learning concepts in the course. You never lose access to the lab exercises, and they can be repeated as often as you like. You will work with complex network environments, real-world host platforms and applications, and complex data sets that mirror the kind of work you may be asked to do. You will be able to take the skills and hands-on experience gained in the course back to the office and apply them immediately.Ī big focus in SEC504 is applying what you learn with hands-on exercises: 50% of the course is hands-on where you will attack, defend, and assess the damage done by threat actors. Using indicators of compromise, you will practice the steps to effectively respond to breaches affecting Windows, Linux, and cloud platforms. In SEC504, you will learn how to apply a dynamic approach to incident response. Keeping your organization out of the breach headlines depends on how well incidents are handled to minimize loss to the company. The goal of modern cloud and on-premises systems is to prevent compromise, but the reality is that detection and response are critical. 33 full labs, 18 Lightning Labs, and an immersive capture the flag event. This course prepares you to conduct cyber investigations and will boost your career by helping you develop these in-demand skills. To reinforce these skills, and to help you retain the course material, 50% of class time is spent on hands-on exercises, using visual association tools to break down complex topics. SEC504 gives you the skills you need to understand how attackers scan, exploit, pivot, and establish persistence in cloud and conventional systems. You'll examine the latest threats to organizations, from watering hole attacks to business email compromise, getting you into the mindset of attackers and anticipating their moves. You will learn how to apply a dynamic incident response process to evolving cyber threats, and how to develop threat intelligence to mount effective defense strategies for cloud and on-premises platforms. SEC504 helps you develop the skills to conduct incident response investigations.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |