Cyber Security Analyst One Certificate

SIEM, Firewall, IPS, WEB Security, Email Security, 5 Practice Labs with 16 Use Cases

Description

The Cyber Security Analyst One Certificate is your next bold step to getting your dream cyber security job.

Being an intense learn-at-your-own-pace program, you will cover only the most fundamental, relevant and in-demand topics including:

  1. SIEM,
  2. Firewall,
  3. IPS,
  4. WEB Security
  5. and Email Security.

In each of these modules you will complete a practice lab containing a combined 16 use cases in total.

What is unique about what you'll experience is Cyber Landing's military-grade Cyber Range.  Having real hands-on experience on a SOC simulator of this caliber will make you stand apart from the competition.  Make no mistake.  Not all Cyber Ranges are equal.  In fact most are pale imitations of real-life, hard-core SOC environments and architecture.

The focus of SOCdrills is on real-life job training and practical skills that are in demand by the industry.  This isn't your typical theoretical dive into the world of SOC you'll find at your local IT Training Department.  You will be gaining the experience that SOC teams are screaming out for when you go for your job interview.

The certificate is engineered for IT graduates with no practical cyber security skills and current IT professionals wanting to cross-over into the more lucrative world of cyber security and to help to achieve proficiency in performing entry level and intermediate-level operations.

The Cyber Security Analyst One Certificate is a training and credentialing program that helps you get the experience and technical skills desperately needed in the industry right now.

 

Learning Objectives

  • Experience 16 must-know use cases on military-grade cyber range.

  • Gain hands-on experience in SIEM use case development process.

  • Firewall is a network security system which can either be a hardware or software that protects the trusted network from unauthorised access from external networks and external threats.

  • IPS or Intrusion Prevention System is a technology that keeps an eye on a network for any malicious activities attempting to exploit a known vulnerability. 

  • Understand web security and how to secure web applications and your organization from the latest web threats.

  • Learn Email Security with targeted threat protection.

  • Able to recognise attacker tools, tactics, and procedures to identify indicators of compromise that can be used during investigations.

  • Able to monitor and analyse logs and alerts from a variety of different technologies across multiple platforms.

  • Able to perform Security events and log collection, monitoring, and analysis.

  • Able to monitor emerging threat patterns and perform security threat analysis.

  • Able to prepare briefings and reports of analysis methodology and results.

  • Able to make use of varied, disparate, constantly changing threat information.

Course Outline

  

Module 1 

SIEM eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 2

SIEM Lab 1, 2 & 3.

Module 3

Firewall eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 4

Firewall Lab 1. Sun Flood Attack, 2. DDoS, 3. Packet Capture

Module 5 

IPS eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 6 

IPS Lab 1. Login Brute Force Attack, 2. External ScaN Reconnaissance, 3. Detect Wannacry Attack, 4. Mobile Malware Attack

Module 7 

Web Security eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 8 

Web Security Lab 1. Malware Detection, 2. Reputation Based Detection, 3. HTTP Response Codes.

Module 9 

Email Security eLearning presentation with knowledge checks throughout and a quiz at the end.

Module 10 

Email Security Lab 1. Malware Detection, 2. Spam Detection, 3. Illegal Content Detection.

Module 11 

Your feedback keeps us on our toes.  We want you to get your dream job in a world-class SOC.

Module 12 

Optional eLearning Forum.

Certification

After you finish the Cyber Security Analyst One Certificate with a score of at least 80%, you will get a Cyber Security Analyst One Certificate in your email and entitled to other membership privileges and discounts.

However, should you wish to gain an entry level position into a SOC team it is highly recommended you first complete Cyber Security Analyst Two, Three & Mentoring Program.

Target Audience

Network and Security Administrators,

Network and Security Engineers,

Network Defense Analyst,

Network Defence Technicians,

Network Security Specialist,

Network Security Operator, and any security professional handling network security operations

Cybersecurity Analyst

Entry-level cybersecurity professionals

Anyone who wants to become a SOC Analyst.

Prerequisites

  • Completed and passed Cyber Security Overview Certificate

  • CCNA or equivalent

  • Relevant IT based University Degree or Vocational Diploma

  • IT industry experience

SOC Path

The SOC is Evolving

Choose the Path that’s Right for You
  1. Self-managed SOC
    This model has an on-premises facility with in-house staff.
  2. Distributed SOC
    Or a co-managed SOC, this model has semi-dedicated full-time or part-time team members who are hired in-house to work alongside a third-party managed security service provider (MSSP).
  3. Managed SOC
    This model has MSSPs providing all SOC services to an enterprise. Managed detection and response (MDR) partners are another form of a managed SOC.
  4. Command SOC
    This model provides threat intelligence insights and security expertise to other, typically dedicated, security operations centers. A command SOC is not involved in the actual security operations or processes, just the intelligence side.
  5. Fusion Centre
    This model oversees any security-focused facility or initiative, including other types of SOCs or IT departments. Fusion centres are considered advanced SOCs and work with other enterprise teams, such as IT operations, DevOps and product development.
  6. Multifunction SOC
    This model has a dedicated facility and in-house staff, but its roles and responsibilities extend to other critical areas of IT management, such as the network operations centres (NOCs).
  7. Virtual SOC
    This model does not have a dedicated on-premises facility. A virtual SOC can be enterprise-run or fully managed. An enterprise-run SOC is generally staffed by in-house employees or a mix of in-house, on-demand and cloud-provided employees. A fully managed virtual SOC, also known as an outsourced SOC or SOC as a service (SOCaaS), has no in-house staff.
  8. SOCaaS
    This subscription-based or software-based model outsources some or all SOC functions to a cloud provider.

Similar courses

Immerse for yourself in the World's best cyber security elearning experience!

More Information

Identity, NetFlow, WAF, Threat Intelligence, Incident Response, 5 Practice Labs with 14 Use Cases.

More Information

How to beat the competition and get the job?

More Information

The Ultimate Threat Hunting Experience!

More Information