Module 1: Enterprise Threats and Vulnerabilities
Learn about standard attack methods and vectors, including malware; session hijacking; social engineering; and attacks using memory vulnerability, web server application, and credentials. Students also explore the threats and vulnerabilities of specialized technology, such as embedded and mobile devices.
Module 2: Threat Data and Intelligence
Examine threat actors, types of threats, threat and data intelligence, attack frameworks, threat and reputational research, and threat modeling,
Module 3: Vulnerability Management
Students investigate common vulnerabilities, improper software exception and error handling, insecure external software components, insecure internal functions, faulty configurations, broken authentication, inadequate monitoring and logging, and vulnerability scanning.
Module 4: Cloud Computing and Assessment Tools
Review cloud threats and vulnerabilities, cloud computing, vulnerability diagnostic tools (software, infrastructure, web applications, wireless networks, and cloud infrastructure.
Module 5: Infrastructure Controls
Learn best practices for securing the information technology infrastructure across the organization.
Module 6: Software and Hardware Assurance Best Practices
Software and hardware best practices.
Module 7: Security Monitoring through Data Analysis
Learn about options for monitoring networks and how to interpret and analyze the data gathered.
Module 8: Security Operations
Learn the fundamentals of security operations, including automation and orchestration and threat hunting
Module 9: Incident Response Planning and Procedures
Learn best practices for responding to an incident to minimizes downtime and reputational harm, including communication, coordinating with stakeholders, threat classification, and standard incident response procedures (detection, analysis, eradication, and recovery).
Module 10: Responding to a Cyber Incident
Review the common Indicators of Compromise (IOCs) and learn digital forensic techniques for investigating cyber incidents.
Module 11: Risk Mitigation
Learn how to minimizing risk, implement risk-based controls, and conduct audits and assessments
Module 12: Data Protection and Privacy
Review technical and nontechnical controls for data protection and best practices for data privacy.