Cyber Security Analyst One Certificate
SIEM, Firewall, IPS, WEB Security, Email Security, 5 Practice Labs with 16 Use Cases
Description
The Cyber Security Analyst One Certificate is your next bold step to getting your dream cyber security job.
Being an intense learn-at-your-own-pace program, you will cover only the most fundamental, relevant and in-demand topics including:
- SIEM,
- Firewall,
- IPS,
- WEB Security
- and Email Security.
In each of these modules you will complete a practice lab containing a combined 16 use cases in total.
What is unique about what you'll experience is Cyber Landing's military-grade Cyber Range. Having real hands-on experience on a SOC simulator of this caliber will make you stand apart from the competition. Make no mistake. Not all Cyber Ranges are equal. In fact most are pale imitations of real-life, hard-core SOC environments and architecture.
The focus of SOCdrills is on real-life job training and practical skills that are in demand by the industry. This isn't your typical theoretical dive into the world of SOC you'll find at your local IT Training Department. You will be gaining the experience that SOC teams are screaming out for when you go for your job interview.
The certificate is engineered for IT graduates with no practical cyber security skills and current IT professionals wanting to cross-over into the more lucrative world of cyber security and to help to achieve proficiency in performing entry level and intermediate-level operations.
The Cyber Security Analyst One Certificate is a training and credentialing program that helps you get the experience and technical skills desperately needed in the industry right now.
Learning Objectives
-
Experience 16 must-know use cases on military-grade cyber range.
-
Gain hands-on experience in SIEM use case development process.
-
Firewall is a network security system which can either be a hardware or software that protects the trusted network from unauthorised access from external networks and external threats.
-
IPS or Intrusion Prevention System is a technology that keeps an eye on a network for any malicious activities attempting to exploit a known vulnerability.
-
Understand web security and how to secure web applications and your organization from the latest web threats.
-
Learn Email Security with targeted threat protection.
-
Able to recognise attacker tools, tactics, and procedures to identify indicators of compromise that can be used during investigations.
-
Able to monitor and analyse logs and alerts from a variety of different technologies across multiple platforms.
-
Able to perform Security events and log collection, monitoring, and analysis.
-
Able to monitor emerging threat patterns and perform security threat analysis.
-
Able to prepare briefings and reports of analysis methodology and results.
-
Able to make use of varied, disparate, constantly changing threat information.
Course Outline
Module 1
SIEM eLearning presentation with knowledge checks throughout and a quiz at the end.
Module 2
SIEM Lab 1, 2 & 3.
Module 3
Firewall eLearning presentation with knowledge checks throughout and a quiz at the end.
Module 4
Firewall Lab 1. Sun Flood Attack, 2. DDoS, 3. Packet Capture
Module 5
IPS eLearning presentation with knowledge checks throughout and a quiz at the end.
Module 6
IPS Lab 1. Login Brute Force Attack, 2. External ScaN Reconnaissance, 3. Detect Wannacry Attack, 4. Mobile Malware Attack
Module 7
Web Security eLearning presentation with knowledge checks throughout and a quiz at the end.
Module 8
Web Security Lab 1. Malware Detection, 2. Reputation Based Detection, 3. HTTP Response Codes.
Module 9
Email Security eLearning presentation with knowledge checks throughout and a quiz at the end.
Module 10
Email Security Lab 1. Malware Detection, 2. Spam Detection, 3. Illegal Content Detection.
Module 11
Your feedback keeps us on our toes. We want you to get your dream job in a world-class SOC.
Module 12
Optional eLearning Forum.
Certification
After you finish the Cyber Security Analyst One Certificate with a score of at least 80%, you will get a Cyber Security Analyst One Certificate in your email and entitled to other membership privileges and discounts.
However, should you wish to gain an entry level position into a SOC team it is highly recommended you first complete Cyber Security Analyst Two, Three & Mentoring Program.
Target Audience
Network and Security Administrators,
Network and Security Engineers,
Network Defense Analyst,
Network Defence Technicians,
Network Security Specialist,
Network Security Operator, and any security professional handling network security operations
Cybersecurity Analyst
Entry-level cybersecurity professionals
Anyone who wants to become a SOC Analyst.
Prerequisites
-
Completed and passed Cyber Security Overview Certificate
-
CCNA or equivalent
-
Relevant IT based University Degree or Vocational Diploma
-
IT industry experience
SOC Path
The SOC is Evolving
Choose the Path that’s Right for You
-
Self-managed SOC
This model has an on-premises facility with in-house staff.
-
Distributed SOC
Or a co-managed SOC, this model has semi-dedicated full-time or part-time team members who are hired in-house to work alongside a third-party managed security service provider (MSSP).
-
Managed SOC
This model has MSSPs providing all SOC services to an enterprise. Managed detection and response (MDR) partners are another form of a managed SOC.
-
Command SOC
This model provides threat intelligence insights and security expertise to other, typically dedicated, security operations centers. A command SOC is not involved in the actual security operations or processes, just the intelligence side.
-
Fusion Centre
This model oversees any security-focused facility or initiative, including other types of SOCs or IT departments. Fusion centres are considered advanced SOCs and work with other enterprise teams, such as IT operations, DevOps and product development.
-
Multifunction SOC
This model has a dedicated facility and in-house staff, but its roles and responsibilities extend to other critical areas of IT management, such as the network operations centres (NOCs).
-
Virtual SOC
This model does not have a dedicated on-premises facility. A virtual SOC can be enterprise-run or fully managed. An enterprise-run SOC is generally staffed by in-house employees or a mix of in-house, on-demand and cloud-provided employees. A fully managed virtual SOC, also known as an outsourced SOC or SOC as a service (SOCaaS), has no in-house staff.
-
SOCaaS
This subscription-based or software-based model outsources some or all SOC functions to a cloud provider.