Ön Koşul
.
Eğitim Hakkında
Sertifika:
Eğitimlerimize %80 oranında katılım gösterilmesi ve eğitim müfredatına göre uygulanacak sınav/projelerin başarıyla tamamlanması durumunda, eğitimin sonunda dijital ve QR kod destekli “BT Akademi Başarı Sertifikası” verilmektedir.
Eğitim İçeriği
- Interpret the components within a playbook
- Determine the tools needed based on a playbook scenario
- Apply the playbook for a common scenario (for example, unauthorized elevation of privilege, DoS and DDoS, website defacement)
- Infer the industry for various compliance standards (for example, PCI, FISMA, FedRAMP, SOC, SOX, PCI, GDPR, Data Privacy, and ISO 27101)
- Describe the concepts and limitations of cyber risk insurance
- Analyze elements of a risk analysis (combination asset, vulnerability, and threat)
- Apply the incident response workflow
- Describe characteristics and areas of improvement using common incident response metrics
- Describe types of cloud environments (for example, IaaS platform)
- Compare security operations considerations of cloud platforms (for example, IaaS, PaaS)
- 1 Recommend data analytic techniques to meet specific needs or answer specific questions
- 2 Describe the use of hardening machine images for deployment
- 3 Describe the process of evaluating the security posture of an asset
- 4 Evaluate the security controls of an environment, diagnose gaps, and recommend improvement
- 5 Determine resources for industry standards and recommendations for hardening of systems
- 6 Determine patching recommendations, given a scenario
- 7 Recommend services to disable, given a scenario
- 8 Apply segmentation to a network
- 9 Utilize network controls for network hardening
- 10 Determine SecDevOps recommendations (implications)
- 11 Describe use and concepts related to using a Threat Intelligence Platform (TIP) to automate intelligence
- 12 Apply threat intelligence using tools
- 13 Apply the concepts of data loss, data leakage, data in motion, data in use, and data at rest based on common standards
- 14 Describe the different mechanisms to detect and enforce data loss prevention techniques
- 14.a host-based
- 14.b network-based
- 14.c application-based
- 14.d cloud-based
- 15 Recommend tuning or adapting devices and software across rules, filters, and policies
- 16 Describe the concepts of security data management
- 17 Describe use and concepts of tools for security data analytics
- 18 Recommend workflow from the described issue through escalation and the automation needed for resolution
- 19 Apply dashboard data to communicate with technical, leadership, or executive stakeholders
- 20 Analyze anomalous user and entity behavior (UEBA)
- 21 Determine the next action based on user behavior alerts
- 22 Describe tools and their limitations for network analysis (for example, packet capture tools, traffic analysis tools, network log analysis tools)
- 23 Evaluate artifacts and streams in a packet capture file
- 24 Troubleshoot existing detection rules
- 25 Determine the tactics, techniques, and procedures (TTPs) from an attack
- 1 Prioritize components in a threat model
- 2 Determine the steps to investigate the common types of cases
- 3 Apply the concepts and sequence of steps in the malware analysis process:
- 3.a Extract and identify samples for analysis (for example, from packet capture or packet analysis tools)
- 3.b Perform reverse engineering
- 3.c Perform dynamic malware analysis using a sandbox environment
- 3.d Identify the need for additional static malware analysis
- 3.e Perform static malware analysis
- 3.f Summarize and share results
- 4 Interpret the sequence of events during an attack based on analysis of traffic patterns
- 5 Determine the steps to investigate potential endpoint intrusion across a variety of platform types (for example, desktop, laptop, IoT, mobile devices)
- 6 Determine known Indicators of Compromise (IOCs) and Indicators of Attack (IOAs), given a scenario
- 7 Determine IOCs in a sandbox environment (includes generating complex indicators)
- 8 Determine the steps to investigate potential data loss from a variety of vectors of modality (for example, cloud, endpoint, server, databases, application), given a scenario
- 9 Recommend the general mitigation steps to address vulnerability issues
- 10 Recommend the next steps for vulnerability triage and risk analysis using industry scoring systems (for example, CVSS) and other techniques
- 1 Compare concepts, platforms, and mechanisms of orchestration and automation
- 2 Interpret basic scripts (for example, Python)
- 3 Modify a provided script to automate a security operations task
- 4 Recognize common data formats (for example, JSON, HTML, CSV, XML)
- 5 Determine opportunities for automation and orchestration
- 6 Determine the constraints when consuming APIs (for example, rate limited, timeouts, and payload)
- 7 Explain the common HTTP response codes associated with REST APIs
- 8 Evaluate the parts of an HTTP response (response code, headers, body)
- 9 Interpret API authentication mechanisms: basic, custom token, and API keys
- 10 Utilize Bash commands (file management, directory navigation, and environmental variables)
- 11 Describe components of a CI/CD pipeline
- 12 Apply the principles of DevOps practices
- 13 Describe the principles of Infrastructure as Code
Önemli Notlar
Program ücretlerine KDV dahil değildir.
Paylaş: