Description
Audience Profile
This 1-day workshop is intended for IT Professionals that require a deeper understanding of Windows Security that wish to increase their knowledge level. This course also provides background in cyber-security prior to taking the other security courses in this track.
At Course Completion
After completing this course, students will be able to:
- Describe the current cybersecurity landscape
- Describe the assume compromise philosophy
- Identify factors that contribute to the cost of a breach
- Distinguish between responsibilities of red teams and blue teams
- Identify typical objectives of cyber attackers
- Describe a kill chain carried out by read teams
- Describe the role, goals, and kill chain activities of the blue team in red team exercises
- Describe the ways limiting how an attacker can compromise unprivileged accounts.
- Describe the methods used to restrict lateral movement.
- Describe how telemetry monitoring is used to detect attacks.
- Explain the concept of Confidentiality, Integrity, and Availability (CIA) triad.
- Describe the primary activities that should be included in organization preparations
- Identify the main principles of developing and maintaining policies
Prerequisites
In addition to their professional experience, students who take this training should already have the following technical knowledge:
- The current cyber-security ecosystem
- Analysis of hacks on computers and networks
- Basic Risk Management