Certified Cybercop - Blue Team
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.53 GB | Duration: 13h 43m
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.53 GB | Duration: 13h 43m
Get free Mock Exam and Flash Cards - Prepared and Developed by CertCop Certified Trainers & Professionals.
What you'll learn
Kali Linux Bash Scripting, SDLC
Cryptography, Firewalls
Forensics, Mobile Device Hacking
Vulnerability Scanning
Requirements
This course requires a basic familiarity with TCP/IP and operating system principles. It's a plus if you're familiar with the Linux command line, network security monitoring, and SIEM technologies. Some fundamental security concepts are expected at this level.
Description
Certcop (A division of Secbay Inc.) Secbay and its partners have provided successful training to many top-edge companies worldwide. They have successfully delivered instructor-led classroom as well as virtual-live training and certification for many industry leaders such as DoD, DHS, US Army, US Navy, US Airforce, Unisys, ICE, BAH, Booz Allen Hamilton, Freddie Mac, Guidewell Source, Disney, Navarro, Apple, Amazon, Deloitte, Seagate and many more.Certified Cyberop - Blue TeamThe Certified Cybercop Blue Team program is designed to teach and evaluate real defensive security abilities across a wide variety of blue-team disciplines, making it ideal for newcomers to the sector as well as seasoned security professionals.A blue team is a group of people that analyze information systems to assure security, find security weaknesses, check the efficacy of each security measure, and ensure that all security measures remain effective once they are implemented.Program Objectives:Blue Team IntroductionBash ProgrammingIncident Response ToolkitPolicies to Mitigate Risk Software Development Lifecycle (SDLC)Security Information Event Management Blue Team MethodologyCryptography and PKIForensicsKali Linux Bash ScriptingMobile Device HackingMobile Hacking Recruiting Blue Team MembersThreat and Vulnerability ManagementVulnerability ScanningIntro to Linux Linux FirewallsWhat is a Linux Server Security Orchestration, Automation, and Response (SOAR)Identity and Access (IAM) Linux Package ManagementSetting Localization Options
Overview
Section 1: Certified Cybercop - Blue Team
Lecture 1 Blue Team Introduction
Section 2: Blue Team Section 1
Lecture 2 Blue Team Methodology
Lecture 3 Recruiting Blue Team Members
Lecture 4 Intro to Linux
Section 3: Blue Team Section 2
Lecture 5 Linux Firewalls
Lecture 6 Bash Programming
Lecture 7 Kali Linux Bash Scripting
Section 4: Blue Team Section 3
Lecture 8 Linux Package Management Part 1
Lecture 9 Linux Package Management Part 2
Lecture 10 What is a Linux Server Shifting through services
Lecture 11 Software Development Lifecycle (SDLC)
Section 5: Blue Team Section 4
Lecture 12 Identity and Access (IAM)
Lecture 13 Vulnerability Scanning Part 1
Lecture 14 Vulnerability Scanning Part 2
Lecture 15 Security Information Event Management
Section 6: Blue Team Section 5
Lecture 16 Incident Response Toolkit
Lecture 17 Security Orchestration, Automation, and Response (SOAR)
Lecture 18 Policies to Mitigate Risk
Section 7: Blue Team Section 6
Lecture 19 Setting Localization Options
Lecture 20 Threat and Vulnerability Management
Lecture 21 Cryptography and PKI
Section 8: Blue Team Section 7
Lecture 22 Mobile Device Hacking Part 1
Lecture 23 Mobile Device Hacking Part 2
Lecture 24 Digital Forensics
Section 9: Free Mock Exam and Flashcards
Lecture 25 Free Flashcards
Security/Network Defenders, Security enthusiasts, Students, Entry-level Cybersecurity Positions and who wish to gain a solid understanding in Defensive security and its usage in real world applications.