Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Security Management & Education
- Security Management: The CIA Triad, defense-in-depth, and Zero Trust principles.
- SOC Structure: Roles and responsibilities (L1 Triage vs. L2 Triage vs. Threat Hunters).
- Security Education: The "Human Firewall."
- Strategies for phishing awareness campaigns.
- Conducting simulated social engineering tests.
- Lab 1: Reviewing a "bad email" phishing simulation report and drafting a user advisory.
Security Information & Event Management (SIEM)
- Security Information: Understanding logs (Windows Event Logs, Syslog, Firewall logs).
- Event Management:
- Filtering noise vs. signal.
- Understanding correlation rules.
- Log retention policies and compliance.
- Lab 2: Ingesting log data into a SIEM (Splunk/Elastic) and running basic searches.
Vulnerability Management & Threat Detection
- Vulnerability Management:
- The vulnerability lifecycle (Discovery, Classification, Remediation).
- Using scanners (Nessus/OpenVAS) effectively.
- Patch management strategies.
- Threat Detection:
- Indicators of Compromise (IoC) vs. Indicators of Attack (IoA).
- The Cyber Kill Chain & MITRE ATT&CK framework basics.
- Network traffic analysis (Wireshark basics: spotting anomalies).
- Lab 3: Scanning a vulnerable VM with OpenVAS and analyzing network traffic for a simulated C2 handshake.
Incident Response & Simulated Attack Capstone
- Incident Response (IR) Lifecycle (NIST):
- Preparation, Detection, Containment, Eradication, Recovery, Lessons Learned.
- Forensic basics: preserving evidence (Chain of Custody).
- Simulated Attack (Live Lab):
- Participants act as the SOC team while the instructor (or automated tool) executes a simulated attack (e.g., ransomware simulation or brute force attack).
- Tasks: Detect the attack via logs, isolate the host, and recover the system.
- Debrief: Post-incident analysis and gap identification.
- Lab 4: Capstone Event: Respond to a multi-stage attack simulation using the full IR lifecycle.
Requirements
Target Audience
- Security Analysts (L1/L2)
- System Administrators transitioning into Security roles
- IT Professionals responsible for organizational defenses
- CISOs/Managers seeking technical grounding
7 Hours
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.