Certified Cybercop - Blue Team

Posted By: ELK1nG

Certified Cybercop - Blue Team
Published 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 6.53 GB | Duration: 13h 43m

Get free Mock Exam and Flash Cards - Prepared and Developed by CertCop Certified Trainers & Professionals.

What you'll learn

Kali Linux Bash Scripting, SDLC

Cryptography, Firewalls

Forensics, Mobile Device Hacking

Vulnerability Scanning

Requirements

This course requires a basic familiarity with TCP/IP and operating system principles. It's a plus if you're familiar with the Linux command line, network security monitoring, and SIEM technologies. Some fundamental security concepts are expected at this level.

Description

Certcop (A division of Secbay Inc.) Secbay and its partners have provided successful training to many top-edge companies worldwide. They have successfully delivered instructor-led classroom as well as virtual-live training and certification for many industry leaders such asĀ  DoD, DHS, US Army, US Navy, US Airforce, Unisys, ICE, BAH, Booz Allen Hamilton, Freddie Mac, Guidewell Source, Disney, Navarro, Apple, Amazon, Deloitte, Seagate and many more.Certified Cyberop - Blue TeamThe Certified Cybercop Blue Team program is designed to teach and evaluate real defensive security abilities across a wide variety of blue-team disciplines, making it ideal for newcomers to the sector as well as seasoned security professionals.A blue team is a group of people that analyze information systems to assure security, find security weaknesses, check the efficacy of each security measure, and ensure that all security measures remain effective once they are implemented.Program Objectives:Blue Team IntroductionBash ProgrammingIncident Response ToolkitPolicies to Mitigate Risk Software Development Lifecycle (SDLC)Security Information Event Management Blue Team MethodologyCryptography and PKIForensicsKali Linux Bash ScriptingMobile Device HackingMobile Hacking Recruiting Blue Team MembersThreat and Vulnerability ManagementVulnerability ScanningIntro to Linux Linux FirewallsWhat is a Linux Server Security Orchestration, Automation, and Response (SOAR)Identity and Access (IAM) Linux Package ManagementSetting Localization Options

Overview

Section 1: Certified Cybercop - Blue Team

Lecture 1 Blue Team Introduction

Section 2: Blue Team Section 1

Lecture 2 Blue Team Methodology

Lecture 3 Recruiting Blue Team Members

Lecture 4 Intro to Linux

Section 3: Blue Team Section 2

Lecture 5 Linux Firewalls

Lecture 6 Bash Programming

Lecture 7 Kali Linux Bash Scripting

Section 4: Blue Team Section 3

Lecture 8 Linux Package Management Part 1

Lecture 9 Linux Package Management Part 2

Lecture 10 What is a Linux Server Shifting through services

Lecture 11 Software Development Lifecycle (SDLC)

Section 5: Blue Team Section 4

Lecture 12 Identity and Access (IAM)

Lecture 13 Vulnerability Scanning Part 1

Lecture 14 Vulnerability Scanning Part 2

Lecture 15 Security Information Event Management

Section 6: Blue Team Section 5

Lecture 16 Incident Response Toolkit

Lecture 17 Security Orchestration, Automation, and Response (SOAR)

Lecture 18 Policies to Mitigate Risk

Section 7: Blue Team Section 6

Lecture 19 Setting Localization Options

Lecture 20 Threat and Vulnerability Management

Lecture 21 Cryptography and PKI

Section 8: Blue Team Section 7

Lecture 22 Mobile Device Hacking Part 1

Lecture 23 Mobile Device Hacking Part 2

Lecture 24 Digital Forensics

Section 9: Free Mock Exam and Flashcards

Lecture 25 Free Flashcards

Security/Network Defenders, Security enthusiasts, Students, Entry-level Cybersecurity Positions and who wish to gain a solid understanding in Defensive security and its usage in real world applications.