What you’ll learn
On course completion, you will be able to:
Identify tools and techniques used to perform an environmental reconnaissance of a target network or security system
Collect, analyse and interpret security data from multiple log and monitoring sources
Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation
Understand and remediate identity management, authentication and access control issues
Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack
Understand the use of frameworks, policies and procedures and report on security architecture with recommendations for effective compensating controls
CompTIA at DDLS
CompTIA is the voice of the world’s information technology (IT) industry. A non-profit association, CompTIA offers IT professionals vendor neutral, industry-leading IT certifications. DDLS is proud to be a CompTIA Authorised Training Partner – offering A+, Security +, Linux+, Network+.
Stay ahead of the technology curve
Don’t let your tech outpace the skills of your people
Quality instructors and content
Expert instructors with real world experience and the latest vendor- approved in-depth course content.
Chosen and awarded by the world’s leading vendors as preferred training partner.
Ahead of the technology curve
No matter your chosen technologies or platforms, we can help you stay one step ahead.
Who is the course for?
Security Analysts, Vulnerability Analysts, Security Engineer, Cybersecurity Specialist, Security Operations Centre (SOC) Analysts
We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources. For more information, please contact us on 1800 853 276.
THREAT AND VULNERABILITY MANAGEMENT
Analyse and apply proactive threat intelligence to support organisational security and perform vulnerability management activities.
Explain the importance of threat data and intelligence
Given a scenario, utilise threat intelligence to support organisational security
Given a scenario, perform vulnerability management activities
Given a scenario, analyse the output from common vulnerability assessment tools
Explain the threats and vulnerabilities associated with specialised technology
Explain the threats and vulnerabilities associated with operating in the cloud
Given a scenario, implement controls to mitigate attacks and software vulnerabilities
SOFTWARE AND SYSTEMS SECURITY
Apply security solutions for infrastructure management and explain software & hardware assurance best practices.
Given a scenario, apply security solutions for infrastructure management
Explain software assurance best practices
Explain hardware assurance best practices
SECURITY OPERATIONS AND MONITORING
Analyse data as part of continuous security monitoring activities and implement configuration changes to existing controls to improve security.
Given a scenario, analyse data as part of security monitoring activities
Given a scenario, implement configuration changes to existing controls to improve security
Explain the importance of proactive threat hunting
Compare and contrast automation concepts and technologies
Analyse and apply the appropriate incident response procedure, analyse potential indicators of compromise, and utilise basic digital forensics techniques.
Explain the importance of the incident response process
Given a scenario, apply the appropriate incident response procedure
Given an incident, analyse potential indicators of compromise
Given a scenario, utilise basic digital forensics techniques
COMPLIANCE AND ASSESSMENT
Apply security concepts in support of organisational risk mitigation and understand the importance of frameworks, policies, procedures, and controls.
Understand the importance of data privacy and protection
Given a scenario, apply security concepts in support of organisational risk mitigation
Explain the importance of frameworks, policies, procedures, and controls
A+, Network+, Security+ (or equivalent knowledge/skills) are highly recommended.
As a minimum attendees must:
Know basic network terminology and functions (such as OSI Model, Topology, Ethernet, Wi-Fi, switches, routers)
Understand TCP/IP addressing, core protocols, and troubleshooting tools
Be able to identify network attack strategies and defenses
Know the technologies and uses of cryptographic standards and products
Be able to identify network- and host-based security technologies and practices
Be able to describe the standards and products used to enforce security on web and communications technologies
Terms & Conditions