Leader dans le secteur des formations en cybersécurité.

C)CSA: Certified Cybersecurity Analyst

Target group

  • Security Professionals
  • Incident Handling Professionals
  • Anyone in a Security Operations Center
  • Forensics Experts
  • Cybersecurity Analysts

Description

This course helps you prepare an organization to create a complete end to end solution for monitoring, preventing, detecting, and mitigating threats as they arise in
real time. Do not fool yourself, this course is far more advanced than you may expect. It is fast paced and thorough, so you can enjoy a well-rounded experience. Be ready to dig deep into the details of security analysis for today’s needs. You will be able to set up and deploy state of the art open source and commercial analysis tools, intrusion detection tools, syslog servers, and SIEMs. You will also be able to integrate them for an entire organization

Program

    1. Network Architecture and how it lays the groundwork
    • Defensive Network
    1. Security Data Locations and how they tie together
    2. Security Operations Center
      • The People, Processes, and Technology
      • Triage and Analysis
      • Digital Forensics
      • Incident Handling
      • Vulnerability Management
    1. Automation, Improvement, and Tuning ® Chapter 1 Labs: Blue Team Principles
    • Analyze Initial Compromise Vector
    • Network Forensics
    • System Forensics
  1. Investigative Theory and Processes 
    • Digital Acquisition
    • Evidence Protocols 
    • Evidence Presentation 
  1. Computer Forensics Laboratory 
    • Protocols 
    • Processing Techniques 
    • Specialized Artifacts 
  1. Advanced Forensics for Today’s Exploitations 
  • Analysis of Captured Network Activity
  • Analysis of Captured Zip File
  • Creating the Safe Environment 
  • Static Analysis 
  • Dynamic Analysis 
  • Behavior Based Analysis 
  • What is different about Ransomware? 
  • Manual Code Reversing 
  • Analysis of an MSFVenom Executable
  • Analysis of Locky Ransomware
  • Creating YARA Rules based on Analysis Results
  • Manual Analysis Principles 
  • Automated Analysis Principles 
    • Signatures compared to Behaviors 
  • Application Protocols Analysis Principles 
  • Networking Forensics 
  • Traffic Analysis of a Website Defacement Attack
  • Traffic Analysis Based on IDS Alerts
  • Traffic Analysis of a ZLoader Delivery Attempt
  • Network Architecture and Monitoring 
  • Endpoint Architecture and Monitoring 
  • Automation, Improvement, and continuous monitoring 
  • Configuring a Firewall
  • Configuring SIEM
  • Configuring IPDS
  • Upgrading Detection/Protection Capabilities
  • Architectural Benefits 
  • Profiling and Baselining 
  • Advanced Analytics 
  • Deploying Agent
  • Implementing User Behavior Analytics through Machine Learning
  • Simulate an Attack and Analyze Alerts
  • Penetration Testing with full knowledge 
    • Reconnaissance  b. Scanning 
    • Enumeration 
    • Exploitation 
    • Lateral Movement 
  • Configuring Defensive Systems
  • Purple Team Testing
  • Mitigation
  • Bypass Anti-Virus and LSASS Patch through edited Mimikat

Goal

Upon completion, the Certified Cybersecurity Analyst candidate will be able to competently take the C)CSA Exam. They will also be ready to prepare an organization
for proactive defense against today’s hackers.

Prerequisites

  • Certified Security Principles
  • Certified Digital Forensics Examiner
  • Certified Incident Handling Engineer
  • Certified Professional Ethical Hacker

Tarif

2800 €

Demande d'information

Je souhaute obtenir plus d'informations sur vos formations

ACG Cyberacademy collecte et utilise les données fournies via ce formulaire afin de traiter vos demandes d'inscription. Les champs marqués d’un * sont indispensables. Les autres informations nous permettent d’optimiser le suivi de votre demande ainsi que la qualité de notre relation client.