Price:
Days:
3
Virtual
Key issues in the InfoSec domain. Importance of threat intelligence in risk management, SIEM, and incident response. Various cyber threats, threat actors, and their objectives for cyberattacks. Fundamentals of threat intelligence (including threat intelligence types, life cycle, strategy, capabilities, maturity model, frameworks, etc.) Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain. Threat intelligence program steps (Requirements, Planning, Direction, Review). Types of data feeds, sources, and data collection methods. Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis. Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization). Data analysis types and techniques including Statistical Data Analysis, Structured Analysis of Competing Hypotheses (SACH), etc. Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation. Different data analysis, threat modeling, and threat intelligence tools. Creating effective threat intelligence reports. Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.
1. Security Roles, Controls, and Threat Intelligence
Compare security roles and responsibilities across IT and cybersecurity teams.
Differentiate between preventive, detective, and corrective security controls.
Identify threat actors, attack vectors, and cyber threat intelligence sources.
Understand security frameworks and compliance requirements that guide cybersecurity best practices.
2. Security Assessments & Threat Mitigation
Conduct risk assessments and vulnerability scans to identify security gaps.
Recognize social engineering attacks, phishing tactics, and malware threats.
Explain cryptographic principles, including encryption, hashing, and digital signatures.
Implement cryptographic techniques to secure data and communications.
3. Implementing Authentication & Identity Management
Deploy authentication methods, including passwords, multifactor authentication (MFA), and biometrics.
Manage identity and access controls to enforce least privilege and role-based access.
Implement Public Key Infrastructure (PKI) for certificate-based security.
4. Securing Network Architecture & Infrastructure
Design and implement secure network architectures (DMZ, segmentation, zero trust).
Configure and deploy network security appliances such as firewalls, IDS/IPS, and VPNs.
Use secure network protocols (TLS, SSH, IPsec) to protect data in transit.
Implement wireless security best practices, including encryption and access controls.
5. Endpoint, Mobile, and Cloud Security
Deploy endpoint security solutions, including anti-malware, host-based firewalls, and patch management.
Implement secure mobile device management (MDM) policies for BYOD environments.
Apply secure coding practices to prevent software vulnerabilities and exploits.
Configure cloud security controls to protect virtualized environments and cloud workloads.
6. Data Protection & Privacy
Explain data classification, storage, and encryption methods to safeguard sensitive information.
Implement data loss prevention (DLP) strategies to prevent unauthorized access and exfiltration.
Understand privacy laws and compliance requirements such as GDPR, HIPAA, and PCI-DSS.
7. Incident Response & Digital Forensics
Develop an incident response plan, including identification, containment, eradication, and recovery.
Utilize forensic tools and techniques to analyze security breaches and collect digital evidence.
Follow legal and regulatory considerations for handling security incidents and investigations.
8. Risk Management & Cyber Resilience
Apply risk management concepts such as risk assessment, mitigation, and acceptance.
Implement business continuity and disaster recovery strategies to maintain cyber resilience.
Strengthen system and network defenses against evolving threats through proactive security measures.
9. Physical Security & Access Controls
Understand physical security controls such as surveillance, access badges, and secure facilities.
Implement hardware security solutions, including secure boot and hardware encryption.
Apply personnel security best practices, such as security awareness training and insider threat mitigation.
Practice Test
Evaluate knowledge and skills with practice exams that simulate the CompTIA Security+ certification test environment.
Identify areas for improvement and review key concepts to ensure readiness
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.