Home Specialist skills Security SEC501: Advanced Security Essentials – Enterprise Defender
SEC501: Advanced Security Essentials – Enterprise Defender
-
Learn the core components of building a defensible network infrastructure and properly securing your routers, switches and other network infrastructure
-
Know the formal methods to perform vulnerability assessment and penetration testing to find weaknesses on your enterprise network
-
Understand the methods to detect advanced attacks against your network and indicators of compromise on deployed systems, including the forensically sound collection of artefacts and what you can learn from them
-
Learn how to respond to an incident using the six-step process of incident response: Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned
-
Understand the approaches to analysing malware, ranging from fully automated techniques to the manual analysis of static properties, interactive behaviour and code reversing
Overview
Off the shelf (OTS)
Become an Enterprise Defender! Enhance your knowledge and skills in the specific areas of network architecture defence, penetration testing, security operations, digital forensics and incident response, and malware analysis. SEC501: Advanced Security Essentials - Enterprise Defender is an essential course for members of security teams of all sizes. That includes smaller teams where you wear several (or all) hats and need a robust understanding of many facets of cybersecurity and larger teams where your role is more focused and gaining skills in additional areas adds to your flexibility and opportunities.
This course concentrates on showing you how to examine the traffic that is flowing on your networks, look for indications of an attack and perform penetration testing and vulnerability analysis against your enterprise to identify problems and issues before a compromise occurs. When a compromise does occur - and it will - you'll be able to eradicate it because you will have already scoped your adversaries activities by collecting digital artefacts of their actions and analysing malware they have installed on your systems. That done, you can then undertake the recovery and remediation steps that would have been pointless if your adversary had persisted on your network.
Delivery method
Face to face
Virtual
Digital
Course duration
48-51 hours
Competency level
Working
Delivery method
-
Face to face
-
Virtual
-
Digital
Course duration
48-51 hours
Competency level
-
Working