Curriculum
Course: Comprehensive Cybersecurity Training
Login

Curriculum

Comprehensive Cybersecurity Training

Module 2: Evaluate Network Security Capabilities, Secure Communication and Assess Endpoints security capabilities

0/33

Module 3: Implement Identity and Access Management and Cryptography & Secure Solution Implementation

0/47

Module 4: Threats, Vulnerabilities, Risk & Social Engineering, Explain Vulnerability Management and Analyze indicators of Malicious activities

0/47

Module 5: Secure Cloud Network Architecture, Explain Resiliency and Site Security Concepts

0/35

Module 6: Governance, Risk and Compliance

0/56
Text lesson

Week 20.1 Explain Incident Response and Monitoring Concepts

Overview

Students will acquire the skills necessary to successfully handle and address cybersecurity incidents. They will understand the incident response process, including preparation, detection, containment, eradication, recovery, and post-incident lessons learned. The course covers practical skills in testing and training response teams, performing threat hunting, and applying legal considerations such as due process and legal holds.

Additionally, students will gain  knowledge of digital forensics, including methods for acquiring evidence from systems and memory, performing disk image acquisition, and ensuring evidence preservation. They will also learn how to document and report findings accurately, maintaining ethical standards and legal validity throughout the investigation lifecycle.

By the end of the course, students will be equipped to proactively and reactively handle security incidents, preserve evidence for legal and organizational purposes, and improve overall cybersecurity resilience.