Cyber Security Core Training
Computer, Linux, and Network Fundamentals
- Basics of Computer
- Installing and uninstalling applications
- Types of web browsers and common settings (Chrome, Firefox, Edge)
- Bookmarks and their benefits
- Control Panel, Task Manager, etc.
- Network Basics
- Types of Computer Networks
- IP addresses
- OSI and TCP/IP Model
- Client Server Networks
- Common Network Protocols (HTTP, DNS, DHCP, FTP, NAT)
Cyber Security Core
- Threat and Vulnerability Management
- Vulnerability Management Life Cycle (Tenable Nessus, Qualys Cloud, Nmap, Snyk)
- Vulnerability Scanning, Reporting, Prioritization, Remediation, and Verification using Qualys and Tenable Nessus
- Qualys Virtual Appliances and Agent Deployments
- Security Operations Center (SOC)
- Incident Analysis and Response Life Cycle
- Creating Phishing Email Campaigns and Cyber Security Awareness Training
- Investigating and triaging several security incidents e.g., Bruteforce, DDOS, Malwares, Phishing Analysis, and triaging
- Microsoft Windows Active Directory and Group Policy
- SIEM Management (Splunk Log Ingestion, Alerts, Dashboard, Reports)
- Splunk Universal forwarders installations on Linux and Windows Servers
- Endpoint Detection and Response (Microsoft Defender ATP)
- Onboarding new Defender ATP agents
- Administering Windows Defender ATP malware policies creation and tuning
- Offboarding Defender, ATP agents
- Investigating Malware Incidents
Need more information? Reach out to us by sending us a message.