Overview
(Pre-Requisite Knowledge of Cybersecurity Professional)
The Cybersecurity Expert course is designed to provide a comprehensive understanding of the advanced concepts and practical skills required to start a career in Cybersecurity. This program is ideal for individuals aspiring to become senior cybersecurity experts, cybersecurity lead or manager equipping them with the knowledge and hands-on experience required to deploy advanced technologies like SIEM, Data Loss Prevention, Endpoint Detection & Response and to handle security incidents in a network.
- What is SIEM
- Functions of SIEM
- SIEM Architecture
- Different SIEM Applications
- Installation of SIEM Solution
- Integration of SIEM Solution with Existing Network Resources
- Collecting and Analyzing Event Logs
- Fine Tuning and Alert Generation
- Creating and Assigning Alert Tickets
- What is EDR
- Installation of EDR
- Deployment of EDR
- Analyzing EDR Alerts
- What is DLP
- Installation of DLP
- Deployment of DLP
- Analyzing DLP Alerts
- What is Incident Response
- Incident Response Policy
- What is Incident Response Policy
- Elements of Incident Response Policy
- Different Types of Incident Response Teams
- Role of Incident Response Manager
- What Does Incident Response Team Do
- Incident Handling
- What is Incident Handling
- CIRC Team
- The REACT Principle
- Maintaining Integrity of Scene Following an Incident
- Legal Aspects of Incident Response
- Legal Considerations of Incident Response
- Expectation of Privacy
- Personally Identifiable Information (PII)
- Giving Notice to Individuals
- Benefits of Information Sharing
- Forensics of Incident Response
- Forensics in Support of an Incident Response
- Phases of Investigation
- Capturing of Data
- Volatile Data Considerations
- Volatile Memory Capture
- Imaging Concepts
- Forensic Acquisition of Data from PC
- Obtaining BitLocker Keys
- Analysis of Forensic Data
- Insider Threat
- What is Insider Threat
- Indicators to Identify an Insider Threat
- Automated Processes to Look for Indicators of Insider Threats
- Policies and Procedures
- Policy Enforcement
- Malware
- Malware Incidents
- Malware Analysis
- Incident Recovery
Course Schedule
Course Schedule
8:00 AM - 10 AM
(IST - GMT +5.30)
2 weeks
2 Hrs/Day
Sunday Off
8:00 PM - 10 PM
(IST - GMT +5.30)
2 weeks
2 Hrs/Day
Sunday Off
8:00 AM - 10 AM
(IST - GMT +5.30)
2 weeks
2 Hrs/Day
Sunday Off
For Online Training Students
- Instructions will be Provided to do Lab Practicals with your PC at Home
- You will receive a link to your email in an hour after the class from Webex to Download the Recorded Videos..
- All our study materials are available for free access on our online portal for registered students
Imp. Note
- Fees once paid will not be refunded or adjusted against other courses / batches / students under any circumstances whatsoever.
- Organization reserves the right to expel any student during the training period.
- In case, a student fails to attend the given batch the amount given will be forfeited against his / her name.
FAQ'S
US-Council Certification is a set of comprehensive programs aiming to create cybersecurity experts capable of defending against cyber threats. Unlike other cybersecurity certification, which focuses on ethical hacking, US-Council provides a broader approach towards cybersecurity education and awareness, including proactive defense strategies and security testing services.
Choosing US-Council for your cybersecurity certification ensures that you receive thorough education and awareness about the latest security measures and cyber threats. With certifications from US-Council, you gain access to free white papers, the opportunity to become an authorized partner, and insights from informative live webinars, all tailored to help you secure or perish in the face of cybercrime.