Skip to main content

Home Specialist skills Security SEC501: Advanced Security Essentials – Enterprise Defender

SEC501: Advanced Security Essentials – Enterprise Defender

  • bullet point
    Learn the core components of building a defensible network infrastructure and properly securing your routers, switches and other network infrastructure
  • bullet point
    Know the formal methods to perform vulnerability assessment and penetration testing to find weaknesses on your enterprise network
  • bullet point
    Understand the methods to detect advanced attacks against your network and indicators of compromise on deployed systems, including the forensically sound collection of artefacts and what you can learn from them
  • bullet point
    Learn how to respond to an incident using the six-step process of incident response: Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned
  • bullet point
    Understand the approaches to analysing malware, ranging from fully automated techniques to the manual analysis of static properties, interactive behaviour and code reversing

Overview

Off the shelf (OTS)

Become an Enterprise Defender! Enhance your knowledge and skills in the specific areas of network architecture defence, penetration testing, security operations, digital forensics and incident response, and malware analysis. SEC501: Advanced Security Essentials - Enterprise Defender is an essential course for members of security teams of all sizes. That includes smaller teams where you wear several (or all) hats and need a robust understanding of many facets of cybersecurity and larger teams where your role is more focused and gaining skills in additional areas adds to your flexibility and opportunities.

This course concentrates on showing you how to examine the traffic that is flowing on your networks, look for indications of an attack and perform penetration testing and vulnerability analysis against your enterprise to identify problems and issues before a compromise occurs. When a compromise does occur - and it will - you'll be able to eradicate it because you will have already scoped your adversaries activities by collecting digital artefacts of their actions and analysing malware they have installed on your systems. That done, you can then undertake the recovery and remediation steps that would have been pointless if your adversary had persisted on your network.

Delivery method
Face to face icon

Face to face

Virtual icon

Virtual

Digital icon

Digital

Course duration
Duration icon

48-51 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • face to face icon

    Face to face

  • Virtual icon

    Virtual

  • Digital icon

    Digital

Course duration
Duration icon

48-51 hours

Competency level
  • Working icon

    Working