This course covers cyber security and trains you to work as a cyber analyst. Participants learn how to use cyber-attack analysis tools independently, monitor security alerts and identify infected devices and sources of attacks. They know how to effectively protect your network, devices and data. Know best practices and the response process in the event of a cyber incident.
Content
- The role of the cyber specialist analyst
- Cyberspace, networks, data and attacks
- Windows operating system and its protection
- Linux operating system and its protection
- Analysis of TCP/IP protocols and services
- Network topologies and infrastructur
- Classification of different types of cyber attacks
- Protecting network and endpoint devices, data and services
- Cyber defence strategy
- Cryptography and PKI
- Vulnerability classification of end devices
- Technologies for effective network security monitoring
- Handling of device and alarm logs
- Analysing attacks, finding infected devices and the origin of the attack
- Efficient response process in the event of a network incident
Learning objectives
- Know the role of the cyber analyst in SOCs
- Understand cyberspace, types of attack and protection
- Know how to protect Windows and Linux operating systems
- Understand how TCP/IP networks work
- Knowledge of cryptographic procedures in transmission networks
- Know the key vulnerabilities of applications and services
- Using tools to effectively monitor security events in networks
- Know how to protect network and endpoint devices and data
- Take effective action in the event of an attack
Target group
- Cyber analysts in SOC centres
- Network and system administrators and operators
- Cyber safety and security experts
- Network, service and application designers
- Anyone who would like to expand their knowledge in the field of cyber defence